url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://community.retool.com/t/color-cell-by-value/7635
code
So this is per column, not per cell. Sorry I missed that part of the request. Having said that, if your cell if a certain number it will only affect that those cells. If you only wanted to make like Cell B20 (like in Excell for example) a certain colour, you couldn't. Unless you made it match a certain criteria: Ex: B20 = 'topics' and test to find topics and you're good. Happy to help here! If you are looking to conditionally set a column to be red or green based on if it has an 's' or 'b' in it you could use one of two code snippets depending on whether the column will only have an 's' or 'b' in it or if they're full words your checking.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00203.warc.gz
CC-MAIN-2023-23
646
3
https://forums.macrumors.com/threads/use-iphone-to-connect-mac-to-internet.677466/
code
Hi I am in a bit of a dilema. I want broadband on the go, but with prices from £30 a month for a decent service/download, I am thinking of paying an extra £5 and getting a iPhone. I have played with the netbooks, and most seem so impractical, and I really do not want a Windows machine. Now, the question is, if I want to connect my PowerBook on the go, can I use the iPhone - either via bluetooth or a USB connection? it will just save me carrying another dongle, and help be go for the iPhone now rather than wait for my Orange contact to run out.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743011.30/warc/CC-MAIN-20181116111645-20181116133645-00364.warc.gz
CC-MAIN-2018-47
551
1
https://meetingorganizer.copernicus.org/EGU22/session/42463
code
Over the past years, many mechanistic soil organic carbon models have been developed. While these models offer a clear improvement in process representation compared to classic SOC models (e.g. of microbial mineralization and mineral protection of OC), the increase in model complexity, and thus the number of uncertain model parameters, is generally not supported by sufficient available data. Thus, model parameters can generally not be sufficiently constrained through a calibration with typically used data, like soil carbon contents, because multiple, similarly good solutions are possible (referred to as the equifinality problem). A common approach to reduce equifinality in SOC models is to use 14C isotopes of SOC as an additional constraint during model calibration. While this approach has shown to improve parameter identifiability (i.e., the identification of unique parameters that lead to optimal results), data on the Δ14C of SOC is often not available due to high measurement costs. Therefore, we explored the potential of constraining a SOC model with the more widely available ratio of stable carbon isotopes of SOC (δ13C). While simulations of Δ14C generally better constrain the turnover time of slowly cycling SOC pools, simulations of δ13C allow to constrain additional processes, such as mixing of OC from aboveground and belowground sources and recycling of SOC through microbes. To do so, we developed a novel mechanistic, microbially driven model that simulates depth profiles of SOC (SOILcarb). In addition to total OC, the model simulates the δ13C and Δ14C value of SOC, by incorporating multiple processes affecting these isotopic ratios in soils. Our results show that SOILcarb was able to accurately simulate depth profiles of total SOC, δ13C and Δ14C of a forest soil. To optimally explore the parameter space, we used a differential evolution calibration algorithm and extracted all parameter sets that led to a reliable simulation of depth profiles given a fixed error margin. The results showed that simulations calibrated only on total OC data did not results in a good fit of simulated depth profiles of either δ13C or Δ14C. In contrast, simulations using either δ13C or Δ14C as an additional model constraint led to accurate simulations of depth profiles of total OC, δ13C and Δ14C by reducing the range in, and absolute value of, parameter values related to mainly vertical transport and protection rates of OC. Notably, parameters related to microbial OC uptake rates and microbial turnover were not better constrained by either isotopic ratio. Our results show that additional constraints on parameter values, in addition to total SOC, are necessary to increase confidence in model parameters of mechanistic SOC models, while more work is needed to better constrain microbial processes in these models.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00100.warc.gz
CC-MAIN-2023-23
2,858
3
http://forum.xfce.org/viewtopic.php?id=4124
code
Was trying to change bottom panel so that only one workspace was available. Whatever I did caused me to lose the bottom panel. Now I have the bottom panel back. Now the only thing on the panel is a "sun-like" icon. Clicking on it does nothing. Right-clicking brings up a menu with choices for properties or customize panel. Clicking on properties brings up Program Launcher. Clicking on Customize Panel brings up Panel Manager. What I want to do is to restore the panel like it was after installing Xubuntu. Not having the open windows show up on the bottom panel is killing me! I know re-installing Xubuntu will fix my problem but I don't want to nuke and start over. As you can probably tell, I'm a very simple and non-technical user of Xubuntu/XFCE. Once I get this fixed, I'll be leaving the bottom panel alone. Thanks in advance for any and all help! (The simpler and non-technical the better!) In Thunar, choose to show hidden files (through the View menu). Browse to the folder .config/xfce4/panel and move it to some backup location. Also, remove the folder .cache with its contents. Restart Xfce without saving the session. Hopefully the default configuration will be regenerated. If it does not work, try moving the entire folder .config/xfce4.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122865.36/warc/CC-MAIN-20170423031202-00539-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,254
4
https://www.freelancer.com/projects/iPhone-Android/Iphone-Android-development-repost/
code
Build a learning application across all mobile platforms. Must incorporate strong graphics, music and augmented reality. You should be a well experienced iPhone, Android, Ipad developer who can develop any type of application, who is well familiar with all the major concepts of development. We too are a software development company and your work will be to work as a full time virtual employee. You should be ready to dedicate all your skills and should be able to put your best in our organisation. You must be hard working and available all time during the period of the project. If you are good then this will turn out to be a long term relationship...This is a great opportunity if you can prove yourself.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948523222.39/warc/CC-MAIN-20171213123757-20171213143757-00361.warc.gz
CC-MAIN-2017-51
711
3
http://reference.clojureneo4j.info/clojurewerkz.neocons.rest.batch.html
code
Batch operation execution (perform connection ops) Submits a batch of operations for execution, returning a lazy sequence of results. Operations must include :method ("POST", "GET", etc) :to (a path relative to the database root URI) and may or may not include :data (a map of what would be in the request body in cases non-batch API was used) :id (request id that is used to refer to previously executed operations in the same batch) If you need to insert a batch of nodes at once, consider using neocons.rest.nodes/create-batch. See http://docs.neo4j.org/chunked/milestone/rest-api-batch-ops.html for more information.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00134.warc.gz
CC-MAIN-2023-23
620
10
https://www.adtechcareers.com/jobs-at-criteo-on-the-engineering-and-modelling-team
code
3 open jobs at Criteo on the Engineering & Modelling team Current filter: Criteo / Engineering & Modelling Filter by location to see more relevant results The Software Engineering team builds the products that make Criteo tick: from developing industry leading machine learning techniques, to building high scale/low latency real-time applications (over 5M qps, handling over 300 Bn HTTP requests daily), to delivering first class client interfaces, both API and UI, with forward-thinking UX at their core, all using state of the art technology.What you'l...Read more about this job What You'll DoCreate high quality, maintainable code that processes and analyzes almost 400 million events daily (and doubling every year)Utilize one the largest private Hadoop clusters in the world and a bleeding edge suite of technologies that push the limits of modern data processingDesign and perfect data models that isolate signal in the noise of real world data and make difficult challenges ...Read more about this job We are looking to hire a skilled web developer that will be focused on back-end development and front-end delivery of a dynamic web experience. To be successful, you should have in-dept knowledge of front-end programming languages, a good eye for aesthetics, and strong agile marketing skills.What you'll do :Work closely with team of designers and developers to build an engaging website experience ...Read more about this job Criteo is the global technology company powering the world’s marketers with trusted and impactful advertising. 2,800 Criteo team members partner with over 20,000 customers and thousands of publishers around the globe to deliver effective advertising across all channels, by applying advanced machine learning to unparalleled data sets. Criteo empowers companies of all sizes with the technology they need to better know and serve their customers.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00070.warc.gz
CC-MAIN-2022-27
1,887
7
https://samridhiagarwalblog.wordpress.com/2017/09/09/euler-problem-no-30-with-python/
code
This problem statement was quite interesting because that not only judged my coding skills but also my mathematical skills. So i tried to solve it in two different ways – Problem Statement – Surprisingly there are only three numbers that can be written as the sum of fourth powers of their digits: 1634 = 14 + 64 + 34 + 44 8208 = 84 + 24 + 04 + 84 9474 = 94 + 44 + 74 + 44 As 1 = 14 is not a sum it is not included. The sum of these numbers is 1634 + 8208 + 9474 = 19316. Find the sum of all the numbers that can be written as the sum of fifth powers of their digits. I first thought of getting the set of numbers (which meet the problem’s criteria) that are to be added, and then add them together to verify that the set is correct and complete. Secondly, make a list of constraints which put restriction on the solution set. This problem excludes the value 1 from consideration. In fact, by intuitive extension, it is excluding all single digit values (numbers < 10) as they cannot form a sum of digits. This is a clue that our search range starts from at least 10.Now we have to think on the end range that’s the maximum limit till which our code should search. After just a moment of thought it becomes clear that the number of digits for the sum must have the same number of digits as a value. Look at the table below to get the maximum limit. |Digits||Maximum n||Limit = 95 x n||Comments| |9||999,999,999||531,441||they need to have the same no. of digits| |8||99,999,999||472,392||nope, still too many digits of n .| |7||9,999,999||413,343||not quite there| |6||999,999||354,294||a valid search limit| So we got the maximum limit as 354,294 . Now let’s write the code. Python Code – TotalSum = 0 Value = #values to be added #Range we got and then comparing the values according to criteria for i in range(10, 354294): Sum = 0 #This sum is for getting one single value for x in str(i): Sum += int(x) ** 5 #checking for main condition with power 5 if Sum == i: #If the sum matches with the value Value.append(i) #The value we are in search for # We add those values stored in the list to get total Sum for i in Value: TotalSum += i print ("Values :" , Value) print ("TotalSum :" , TotalSum) Values : [4150, 4151, 54748, 92727, 93084, 194979] TotalSum : 443839 I also tried with other way by defining a function. Python Code -> def power_of_digits(n, exp = 5): Sum = 0 while n > 0: Sum += (n % 10)**exp n //= 10 return Sum total = 0 for i in range(10, 10**6): if power_of_digits(i) == i: total += i print(total) Happy Coding! 🙂
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591831.57/warc/CC-MAIN-20180720193850-20180720213850-00170.warc.gz
CC-MAIN-2018-30
2,547
25
https://ux.stackexchange.com/questions/23650/default-choice-for-a-leave-without-saving-changes-dialog
code
I have an existing design (web application) where users can edit small parts in a webpage. A small editor will open up with the editable fields and three buttons: [Cancel & Close] [Clear] and [Save]. Whenever you make a change and click [Cancel] a small dialog appears: Do you want to save these changes? [Yes] / [No] The [Yes] button has been styled as the to make it look like the default choice. Does this make sense? Isn't it better to ask the user if he/she is sure toe leave without saving any changes? Something like: Ignore unsaved changes?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00611.warc.gz
CC-MAIN-2023-50
548
6
https://mathematica.stackexchange.com/questions/226572/obtain-the-analytics-region-from-mesh-or-vtk-file
code
Is it possible to obtain the region inequalities from a mesh file (vtk-file). On gmsh I build a Sphere, and with Mathematica I would like to obtain the analytics region function, that's is possible?. I can obtain the vertex from the file sphere.vtk, using that: data = Import["mesh_2_5.vtk", "VertexData"]; But I do not know if exists a routine for obtaining the analytics equations that define this structure. The sphere.vtk can be downloaded from: https://gofile.io/d/OscWUA
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178372367.74/warc/CC-MAIN-20210305122143-20210305152143-00563.warc.gz
CC-MAIN-2021-10
476
5
https://forge.typo3.org/issues/67243
code
Implement folding of scheduler task groups Scheduler's task groups is really usefull feature in a projects, that use CLI intensively. In addition it would be good to have folding in "Scheduler" module, based on task groups. State may be saved in BE user's "uc". By default all groups are opened. [FEATURE] EXT:Scheduler: Implemented folding of scheduler task groups Tested-by: TYPO3com <[email protected]> Reviewed-by: Philipp Gampe <[email protected]> Tested-by: Philipp Gampe <[email protected]> Reviewed-by: Christian Kuhn <[email protected]> Tested-by: Christian Kuhn <[email protected]>
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527458.86/warc/CC-MAIN-20190722010436-20190722032436-00428.warc.gz
CC-MAIN-2019-30
617
9
http://www.fizzymagic.net/Geocaching/gpx2html/gpx2html_news.html
code
GPX to HTML Converter version 1.71 now will allow abbreviations of long-name cache series for use in your GPS. version 1.60 now will add notes from Watcher to the cache pages. It also allows a distance limit for caches sorted from reference locations. version 1.50 uses a different date/time engine, and can now handle dates before the Unix epoch. So it will work with benchmark GPX files from bmgpx. Version 1.30 has some big changes. First, the decoded hints are now at the bottom of the cache pages, so there is no separate hints file. Second, this version now writes out a .loc file named Caches.loc that contains the caches in a format easily read by EasyGPS or ExpertGPS. The caches in this new file have been processed through gpx2html, so corrected caches and ignored caches are the same as your HTML version. Version 1.20 has been upgraded to use the new groundspeak:exported field (added by ClayJar, who wrote Watcher) to correctly record date each cache description was exported from geocaching.com. The version also includes a new index page of unfound caches, and improved cache sorting that will work with the new geocaching ID-naming scheme due in a month or so. Version 1.19 fixes an issue some people had with the use of the File::Slurp package. The GPX cleaner now does not use File::Slurp, so it should be more compatible. Version 1.18 now tracks travel bugs, and generates a new index page of caches with travel bugs, sorted by date the cache was last found. The caches with travel bugs that were most recently logged appear at the top of this index page. Version 1.17 fixes an issue with Plucker, in which Plucker refuses to load HTML files with illegal HTML in them. Plucker is very picky about HTML, so even if a page looks good in a browser it might contain bad HTML from Plucker's point of view. This is normally not a big problem; a few cache pages might not load, but that's life. However, if the illegal HTML was in a hint, then Plucker would refuse to load the entire hints file! So all but the most basic HTML is being stripped from hints. I have written a little Perl script that will clean GPX files to eliminate illegal XML characters, which appear to be present in some cache descriptions. I don't have it as an exe file, so you'll need Perl to run it for now. It's gpxclean.pl. If you use gpx2html, the cleaning is now built in to the application, so you won't need it.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202450.86/warc/CC-MAIN-20190320190324-20190320212324-00230.warc.gz
CC-MAIN-2019-13
2,404
10
https://docs.resco.net/wiki/Dynamics
code
Microsoft Dynamics is a line of enterprise resource planning (ERP) and customer relationship management (CRM) software applications. Dynamics can benefit from tight integration with Resco platform, gaining access to powerful and fully customizable mobile applications that can work with the data of your Dynamics organization, even offline. To verify that the Resco solution was installed successfully, and to manage the solution, go to Settings > Solutions and search for "Woodford". Resco functions on Dynamics By installing Woodford, you can now access additional tools from your Dynamics server. In the list of published apps, search for Resco Suite: You can then access the different Resco features: - Woodford: Customization and configuration of Resco mobile application directly from your web browser. - Location Tracking: View and analyze the position of mobile users. - Mobile Reports: Create and manage your custom mobile reports. - Mobile Auditing Map: View transactions across records and users on a map. - Mobile Auditing Records: View a chronological list of transactions across records and users. - Sync Dashboard: Monitor synchronization details of your users and devices. App projects are customized versions of Resco mobile application dedicated to a particular set of users. Or more precisely, the application remains the same, but each project may have a different set of data and functions available. For example, your mobile sales team may need easy access for showcasing products and creating up new orders, field technicians may need instructions that guide them through the process of a maintenance inspection, and their managers can be interested in seeing the aggregated data or monitor the location of their staff on a map in real time. Resco on Dynamics comes with a set of default project templates designed for concrete scenarios (for example, mobile sales or inspections) and these can be further customized using the Woodford tool, or you can design your own app project from scratch. Resco is also compatible with Microsoft Dataverse, formerly known as Project Oakdale, formerly known as Microsoft Dataflex, formerly known as Common Data Service (CDS). To make the process of creating a mobile experience for CDS even easier, we also created a default app project for CDS organizations where there are no Sales entities present. Resco offers several mobile apps that understand app projects and allow you to work with your Dynamics data. To get started, download any of the app and connect to Dynamics. If you're not sure which app to download, get the classic Resco Mobile CRM.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519784.35/warc/CC-MAIN-20210119201033-20210119231033-00444.warc.gz
CC-MAIN-2021-04
2,612
16
https://recruit-it.dk/ledige-stillinger/90533/
code
If you are a highly skilled and experienced .NET Core (C#) developer that is passionate about the newest technologies, micro services, event-driven architecture, short sprints and frequent deployment, then it will be difficult to find a more attractive role than this. Mover Systems are searching for senior developers to join their team in an innovative and high-energy environment where they develop some of the worlds best products within process automation for logistics. They believe that they can make the world slightly better by making logistics smarter. The position is at the Headquarters in Copenhagen, and they are expanding to new markets with a growing customer base of international companies. As part of Mover, you will get to work in a fun and dynamic environment and build products that is being used by strong brands such as IKEA, Interflora, Coop and many more. Play your part in their team succeeding You will join early in the scale-up phase and make your mark on an ambitious journey. You will develop software, teach, and learn among talented colleagues, and be responsible for delivering key product features that are crucial to our success and future growth. Specifically, you will: - Develop software that deliver functionality to front-end and partners through APIs - Bring new features all the way from design to production and implementation as well as continuous improvement - Technical design of new functionality - Explore new technologies and approaches to continuously improve ways of working - Maintain the platform and ensure stability on Azure This is what we are passionate about There are things they are grateful for, things they are religious about, things they are proud of, and things they are passionate about. Here is a list of some of them: - Our culture - Trust of our customers - Our products - Reducing waste in the environment - Eliminating non-value adding activities - Micro services - Event-driven architecture - Test-driven design - Automated processes - The newest version of .NET-core - Two-week sprints - Continuous deployment - Domain Driven Design - Clean code …and much more What you need to make a difference As a skilled and enthusiastic developer, you probably think of C# as your native language. You thrive on building and being a part of creating the next big thing. Your skills in C# are outstanding and best in class, but you are always trying to evolve and get even better. Your personality and energy must match the company's culture, which is ambitious, curious and value driven, where we value respect, honesty, and trust as much as professional achievements. We don't expect you to be the answer to everything, but you must tick several of the following points: - 5+ years of experience as a professional backend developer - Advanced programming experience in .NET Core (C#) - Experience in designing and creating APIs - Experience with building scalable and distributed systems - Experience with automated testing and implementation - An interest in understanding the business domain and creating value for end users - Experience with Azure or another cloud provider is a plus Everyday life at Mover You will be part of a social and professional community in a technology company that grows fast. We are on our way to several new markets in Europe, and you will be based at our new and nice headquarter in Copenhagen City with approx. 50 other enthusiasts. Your new colleagues come from different backgrounds, common to all, however, is that they are talented and inspiring. In Mover, we're all part of the success, we're having fun, and we're growing – together.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00428.warc.gz
CC-MAIN-2022-33
3,642
42
https://community.openlms.net/user/josh_manders
code
Josh Manders 155 LaneCC - LMS Admin Lifetime learner and genetically pre-disposed to working in education (4th generation instructor?). Love the tech toys but most comfortable in the great outdoors. Love for long distance biking, camping, hiking, music, and supporting the efforts of inspiring leaders. Do you have questions for Josh Manders? Log in to ask Josh Manders questions publicly or anonymously. Long of the short: manual activity checkboxes have been substituted for a button and other changes will increase course scrolling. CSS edits will help but only go so far. Student Role: Class registration deadlines financial aid, last day to drop/refund Instructor Role: Grade submission deadlines, Enrollment cut offs, Committee meetings/information. Support Services Role: Production calendar, internal/external service info It's completely possible with site calendar via an RSS feed but needs a little help from someone who can contribute code for it to be more useful. Interested? Vote up the feature request to Moodle HQ: https://tracker.moodle.org/browse/MDL-70449 -- or contribute some code! Two massive features missing from OpenLMS reporting/analytics: • Schedulable reports • Historic analysis beyond courses available in the system. (i.e. Products like Intelliboard) This may be less of an issue for institutions who do not archive/remove completed courses. We need automated reporting to: • instructors for specific course metrics at key intervals (drop date, mid-term, final summary) • instructors for summative course data over time (comparative data, baseline with others?) • deans for high level data on students and instructors • VP's with program/department level data • students for self improvement over duration of a degree. • Early Outreach Specialist - Proactive intervention for struggling students. Sharing data and establishing "Roles" in Education is really tricky. Presenting specific data about an instructors performance may violate union contracts or exposing student data may bump against student record policies.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104655865.86/warc/CC-MAIN-20220705235755-20220706025755-00238.warc.gz
CC-MAIN-2022-27
2,066
21
https://www.deanvancecpa.com/pages/services/blue-bell-credit-card-receipt-tracking
code
If you permit your team to possess company credit cards it is important to make sure that all activity is properly documented and coded. We recommend using a service such as Expensify to ensure that all receipts are accounted for its corresponding activity. This software provides a strong platform for management approvals if required as well as an ability for the user to select from a list of accounts so that the activity is properly coded. If you choose to have us handle this aspect of the finances, your team would be responsible for sending all reports to us for approval. We would ensure that everything is accounted for and coded. If requested, we would send reports up to another member of your internal team for final approval once everything is properly accounted for within the system.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00838.warc.gz
CC-MAIN-2024-10
799
1
https://example-a.com/answer/35199576
code
What is the property in an AppointmentItem (MeetingStatus = olMeeting), to change the Calendar I'm using to schedule a meeting? It is using the default account no matter what. I need to alternate between accounts configured in Outlook. I tested these properties: The Organizer property of the AppointmentItem class is read-only. So, the only possible way is to re-create appointment in the appropriate calendar/folder. See How To: Create a new Outlook Appointment item for possible ways.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474377.60/warc/CC-MAIN-20240223085439-20240223115439-00684.warc.gz
CC-MAIN-2024-10
487
5
https://quotesforwork.com/the-junior-senator-from-wisconsin-by-hi-a-william-fullbright-quote/
code
The junior senator from Wisconsin, by his reckless charges, has so preyed upon the fears and hatreds and prejudices of the American people that he has started a prairie fire which neither he nor anyone else may be able to control. Quotations can be an effective way to convey a point in a work presentation. These work related quotes are also often used at the beginning of business book chapters and reports. A business quote is a quick way to summarise the forthcoming content. Many William Fullbright quotations are applicable to work settings. So if you are responsible for preparing a report for work and need a succinct way of getting your point across, you may find William Fullbright quotes will do the job perfectly! Is this the correct William Fullbright quote? If not then search for William Fullbright quotes.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358033.38/warc/CC-MAIN-20210226234926-20210227024926-00044.warc.gz
CC-MAIN-2021-10
821
4
https://bkex.zendesk.com/hc/en-us/articles/4403718541849
code
Initial margin rate = 1/leverage Maintenance Margin = Position Value * Maintenance Margin Rate BKEX will take the following measures to maintain market stability according to market fluctuations and industry development, including but not limited to: 1. Adjust the maximum available leverage. 2. Adjust the position limit of each level. 3. Adjust the maintenance margin ratio of each level.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00183.warc.gz
CC-MAIN-2023-40
390
6
https://lists.ubuntu.com/archives/ubuntu-users/2010-October/229878.html
code
[ping seanh] Re: log in problem ashw at lr.net Mon Oct 4 13:21:03 UTC 2010 I didn't see the original repl for some reasson. >On 10/03/2010 03:44 PM, Thierry de Coulon wrote: >> On Monday 04 October 2010, Ash Wyllie wrote: >>> I can't log onto my laptop from the internal drive. >>> I can use the computer a USB stick. >>> I can see that the drive is there, that all the data is on it, and that >>> there is no free space (0 bytes) on the drive. >> That may be the key of your problem: no place, the system can't create >> logs. How is your disk partitioned? "A la Windows", with one big partition >> and everything in it? That is my suspicion. The disk was partitioned by Dell at the factory, and came with Ubuntu installed. There is a 3GB swap partition and a 117GB Ubuntu How does one get permission to do file deletes while using a USB stick? >>> When I try to log in, there is a notice >>> "INSTALL PROBLEM >>> The comfiguration of dedfaults for Gnome Power Management have not been >>> installled properly >>> Please contact your computer administrator." >>> Is there some way to get at the hard drive and delete a couple files? >> I'm not sure to understand "I can use the computer a USB stick". Anyway, >> you should find a way to boot from a live system (USB stick or live CD), >> then mount your disk/partition and, as root, you should ne able to delete I can boot from the USB stick. But I don't have permissions to do anything useful, like deleting files. I did find how to boot into recovery mode. I then did "rm BigRedundantDirectory" which didn't help. The directory is gone, but no space was freed up. Now that I am in recovery mode, is there a way to force Ubuntu to validate the >> You can also check the size of the directories, most probably /home/<your >> user>. If one directory is _very_ big, then the file to delete is there. >> If a program get's stuck in an error loop, it may fill up your disk space >> with a huge error log. That's why /home should _always_ be on a separate >> partition, so if your home directory get's full, you can still log in as >> root to clear space (that's where Ubuntu's policy bites back as you'll >> have to do this at the command line...) I looked, there are no 8GB (which was the old free space size) files. >> Hope that helps >Other than the 0 bytes, the gnome power manager error msg sounds exactly >like the problem that seanh was having in the "Can't login into Gnome >after updates yersterday (10.04" . I wonder if this is becoming a trend. Vote the greater evil. More information about the ubuntu-users
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667945.28/warc/CC-MAIN-20191114030315-20191114054315-00117.warc.gz
CC-MAIN-2019-47
2,565
45
http://pkgsrc.se/sysutils/htop
code
/htop, Enhanced version of top utility 2.0.2, Package name: htop-2.0.2, Maintainer: pkgsrc-users This is htop, an interactive process viewer. Comparison between 'htop' and 'top' * In 'htop' you can scroll the list vertically and horizontally to see all processes and full command lines. * In 'top' you are subject to a delay for each unassigned key you press (especially annoying when multi-key escape sequences are triggered by accident). * 'htop' starts faster ('top' seems to collect data for a while before displaying anything). * In 'htop' you don't need to type the process number to kill a process, in 'top' you do. * In 'htop' you don't need to type the process number or the priority value to renice a process, in 'top' you do. * In 'htop' you can kill multiple processes at once. * 'top' is older, hence, more tested. Required to run: ] Required to build: Master sites: SHA1: Version history: (Expand) - (2016-07-22) Updated to version: htop-2.0.2 - (2016-05-06) Updated to version: htop-2.0.1nb1 - (2016-05-06) Updated to version: htop-2.0.1 - (2015-08-18) Updated to version: htop-1.0.1nb1 - (2012-03-21) Updated to version: htop-1.0.1 - (2011-08-06) Updated to version: htop-0.9 CVS history: (Expand) | 2017-03-25 11:53:59 by Maya Rashish | Files touched by this commit (2) | htop: add missing include to fix build on netbsd-7.99.x. must've side-loaded sys/time.h before. From Chavdar Ivanov on pkgsrc-users. | 2017-01-31 23:24:28 by Maya Rashish | Files touched by this commit (1) | Remove commented out OS limitation - it doesn't make sense to limit this package (since 2.x), it will work for most. | 2016-07-22 07:45:06 by Thomas Klausner | Files touched by this commit (1) | | Reset PKGREVISION after update. | 2016-07-22 07:30:58 by Maya Rashish | Files touched by this commit (3) | | Update sysutils/htop to 2.0.2 Mac OS X: stop trying when task_for_pid fails for a process, stops spamming logs \ Add Ctrl+A and Ctrl+E to go to beginning and end of line FreeBSD: fixes for CPU calculation (thanks to Tim Creech, Andy Pilate) Usability: auto-follow process after a search. Use Linux backend on GNU Hurd Improvement for reproducible builds. BUGFIX: Fix behavior of Alt-key combinations (thanks to Kang-Che Sung) Various code tweaks and cleanups (thanks to Kang-Che Sung) | 2016-05-06 18:00:47 by Filip Hajny | Files touched by this commit (3) | | Restore SmartOS support. Bump PKGREVISION. | 2016-05-06 11:04:17 by Thomas Klausner | Files touched by this commit (8) | | Updated htop to 2.0.1. Update to 2.0.0 from coypu in wip, updated by myself to 2.0.1. What's new in version 2.0.1 * OpenBSD: Various fixes and improvements (thanks to Michael McConville and Juan Francisco Cantero Hurtado) * FreeBSD: fix CPU and memory readings (thanks to Tim Creech, Hung-Yi Chen, Bernard Spil, Greg V) * FreeBSD: add battery support (thanks to Greg V) * Linux: Retain last-obtained name of a zombie process * Mac OS X: Improve portability for OS X versions (thanks to Michael Klein) * Mac OS X: Fix reading command-line arguments and basename * Mac OS X: Fix process state information * Mac OS X: Fix tree view collapsing/expanding * Mac OS X: Fix tree organization * Mac OS X: Fix memory accounting * Fix crash when emptying a column of meters * Make Esc key more responsive * Plus assorted fixes What's new in version 2.0.0 * Platform abstraction layer * Initial FreeBSD support * Initial Mac OS X support (thanks to David Hunt) * Swap meter for Mac OSX (thanks to Ștefan Rusu) * OpenBSD port (thanks to Michael McConville) * FreeBSD support improvements (thanks to Martin Misuth) * Support for NCurses 6 ABI, including mouse wheel support * Much improved mouse responsiveness * Process environment variables screen (thanks to Michael Klein) * Higher-resolution UTF-8 based Graph mode (Thanks to James Hall from vtop for the idea!) * Show program path settings (thanks to Tobias Geerinckx-Rice) * BUGFIX: Fix crash when scrolling an empty filtered list. * Use dynamic units for text display, and several fixes (thanks to Christian Hesse) * BUGFIX: fix error caused by overflow in usertime calculation. (thanks to Patrick Marlier) * Catch all memory allocation errors (thanks to Michael McConville for the push) * Several tweaks and bugfixes (See the Git log for details and contributors!) | 2015-11-04 02:32:42 by Alistair G. Crooks | Files touched by this commit (499) | Add SHA512 digests for distfiles for sysutils category Problems found with existing digests: Package memconf distfile memconf-2.16/memconf.gz Problems found locating distfiles: Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9 Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. | 2015-08-20 15:38:25 by Jonathan Perkin | Files touched by this commit (5) | Enable build on SunOS if /system/lxproc is available.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121165.73/warc/CC-MAIN-20170423031201-00571-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
5,189
114
https://www.producthunt.com/@amyevejo
code
Owner, Amy Eve Joamyevejo.com A shareable profile that sums you up as a maker 👨💻🛠👩💻 Customer feedback, public roadmap & product changelog 6.5 million state and federal cases dating back to 1600s Put your small, important tasks on autopilot. Marketplace for unbranded luxury goods Mindful personal goal setting for iPhone Learn how to build for the web and see where you stand 🌟 MIT licensed PSD illustrations, in 2 styles A simple, easy-to-use annotation tool for Mac Validate your code for consistency with a coding standard. Create instant, real-time polls for free A curated list of all the tools you need to get work done The way to watch anything with anyone Fundamentals on data visualization Your go-to hub for e-commerce tools & resources Organisation app for family life Understand your true-self and take ownership of your life. 480 Open Source icons for common actions & items A reflection tool and calculator for visualizing time Never forget to water your plants again.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744381.73/warc/CC-MAIN-20181118135147-20181118160559-00059.warc.gz
CC-MAIN-2018-47
1,000
21
http://chesstris.com/2016/05/
code
This last week was all VR ideas. I spent a lot of free time in the Vive, and thinking about VR in general. Wednesday night was the monthly VR & HCI meetup, and the standout for me from Matt & Tommy’s excellent presentation was probably just finding out that there are three different open source projects for vive utilities. (None of which were the one I linked to last week.) Matt went through what each one provides, and even had Tommy play around in the demo scene from each. The three projects were Newton VR, Steam VR Unity Toolkit, and ViveGrip. Anyway, here were the ideas: 5/20 – Thinking about mining-sim games, and in particular the 2D ones where you have to dig downward continuously, finding resources in the passageways you’ve excavated. Imagine a mechanic like that in VR. You hold a mining tool that lets you point it at the ground and excavate, collecting the rock, and then you’d have to teleport into the hole you’ve created, looking at all the walls for gems and coins and things to collect. Maybe your excavation tool has lots of settings, one that lets you blast away whole walls, and also one that lets you carve tiny crevices around interesting looking bits of the surface. You could unearth fossils, and evidence of alien civilizations. 5/21 – A game where every time you teleport, you are transported to a randomly generated world very like the one you are in, but subtly different. Probably this is a procedurally generated world in some way, and all but one or two (different) parameters are persistent from one generation to the next. Maybe you are a scientist and there is a story about why this happens, or you are an explorer searching for a world with some specific properties. 5/22 – A VR space battle game, like a mix of real-time strategy, turn-based strategy, Xortex (the lab space shooter), and a little bit of Subterfuge. You assign a unit to go to a specific place by simply grabbing it and moving it to the new place. (The play field should be the size of your VR space.) The unit would then start moving toward where you let go of it, (which still shows as a translucent version of itself), and you could of course grab either again at any time, to re-position. I thought through a bunch more about this, and have some neat ideas for how building / spawning could work too. 5/23 – A “Put your head in things” game. Putting your head in random models in VR is kinda fun, and I think it would be cool if there was a game completely written around the premise. Essentially, everything takes place in a room, and if you put your head outside the walls of the room, you see outer space, (or something weirder), so you know you aren’t supposed to be out there. Inside the room, there are different boxes. Each box has another room inside it, and putting your head in there for a sufficient period of time (a few seconds) would transport you there. Basically, at any given time, whenever you put your head through a model, you should see something else. If you put your head back through the outer wall of any room, you would see the original room around it, and if you wait, again, you’ll be teleported back to that. You should be able to dig deeper into each experience at least 3 or 4 levels. 5/24 – Marble-rolling sandbox game in VR. You know those block sets with grooves cut into them for rolling marbles? Imagine having infinite blocks! And maybe also those wires you can position. And maybe you have to hit checkpoints with a limited number of marbles or pieces or something. 5/25 – More thinking about room-scale puzzle prison. Also imagined a similar but totally different game, but with the same sort of “block walls” where you grab the blocks and put them into empty spaces. Nothing falls, but every time you place one, another one is generated in your hand. So maybe you always have two to choose between, since you have two hands. I also spent some time thinking about cord tangling, and how it’s going to be a pain in Puzzle Prison. I should maybe keep track of how many times the player has rotated in either direction and incentivize rotation back to zero in some way, possibly with power ups or possibly with a simple visual inductor. 5/26 – A sort-of VR DDR, where there are colors on the floor. The color your headset is over is the selected color (it should be indicated at all times in some obvious way) and the only color you can currently “break”. Random colored indicators are constantly moving toward you (maybe a bit like AudioShield) but you have to be on the right color to match them. Maybe they are also different shapes, and you also have to match the shape by rotating or swiping your controller in some way.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474669.36/warc/CC-MAIN-20240226225941-20240227015941-00347.warc.gz
CC-MAIN-2024-10
4,715
9
https://www.mankier.com/package/libconfuse
code
libConfuse is a configuration file parser library, licensed under the terms of the ISC license, and written in C. It supports sections and (lists of) values (strings, integers, floats, booleans or other sections), as well as some other features (such as single/double-quoted strings, environment variable expansion, functions and nested include statements). It makes it very easy to add configuration file capability to a program using a simple API. The goal of libConfuse is not to be the configuration file parser library with a gazillion of features. Instead, it aims to be easy to use and quick to integrate with your code. cfg_defvalue_t Data structure holding the default value given by the initialization macros. cfg_opt_t Data structure holding information about an option. The value(s) are stored as an array of fundamental values (strings, numbers, etc). Examples: ftpconf.c... cfg_simple_t Data structure holding the pointer to a user provided variable defined with CFG_SIMPLE_*. cfg_t Data structure holding information about a 'section'. Sections can be nested. A section has a list of options (strings, numbers, booleans or other sections)... cfg_value_t Data structure holding the value of a fundamental option value. confuse.h A configuration file parser library.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280133.2/warc/CC-MAIN-20170116095120-00223-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
1,279
12
https://community.oracle.com/customerconnect/discussion/487847/how-to-import-a-job-template-with-the-external-description-in-html-format
code
How to import a Job Template with the External description in HTML Format ? We have create a Job Template using the TCC import, however the import was successful, the External, Internal Job description/qualification is not coming in a proper layout. For Example : Bachelor�s Degree in Programming, Computer Science or related field � 6+ years� management experience in an IT environment � 2+ years� experience working with EMR/EHR systems � Microsoft Windows certificates highly desirable � Experience providing IT solutions in a clinical environment preferred Also, please let me know what is the primary key to be used while running the Job Template update import process. Any insight on this matter would be greatly appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00169.warc.gz
CC-MAIN-2023-06
745
6
https://lists.torproject.org/pipermail/tor-dev/2013-September/005429.html
code
[tor-dev] Thoughts on Proposal 203 [Avoiding censorship by impersonating a HTTPS server] haqkrs at gmail.com Thu Sep 12 20:00:22 UTC 2013 Thanks for your feedback, please see inline. On 12 September 2013 09:03, Jeroen Massar <jeroen at massar.ch> wrote: > On 2013-09-12 09:25 , Kevin Butler wrote: > [generic 203 proposal (and similar http scheme) comments] > - HTTPS requires certificates, self-signed ones can easily be blocked > as they are self-signed and thus likely not important. > If the certs are all 'similar' (same CA, formatting etc) they can be > blocked based on that. Because of cert, you need a hostname too and > that gives another possibility of blocking > - exact fingerprints of both client (if going that route) and server > cert should be checked. There are too many entities with their own > Root CA, thus the chained link cannot be trusted, though should be > checked. (generation of a matching fingerprint for each hostname > still takes a bit and cannot easily be done quickly at connect-time) I should have made my assumptions clearer. I am assuming the CA is compromised in this idea. I have assumed it is easy to make a counterfeit and valid cert from the root but it is hard(read infeasible) to generate one with the same fingerprint of the cert the server actually has. This is the key point that I think helps against a MITM, if the fingerprint of the cert we recieved doesn't match with what the server sent us in the hmac'd value, then we assume MITM and do nothing. > > I think the best course of action is to use a webserver's core > > functionalities to our advantage. I have not made much consideration for > > client implementation. > Client side can likely be done similar to or using some work I am > working on which we can hopefully finalize and put out in the open soon. > Server side indeed, a module of sorts is the best way to go, you cannot > become a real webserver unless you are one. Still you need to take care > of headers set, responses given and response times etc. I'm interested in the work you've mentioned, hope you get it finalized soon > > * The users Tor client (assuming they added the bridge), connects to > > the server over https(tls) to the root domain. It should also > > downloads all the resources attached to the main page, emulating a > > web browser for the initial document. > And that is where the trick lies, you basically would have to ask a real > browser to do so as timing, how many items are fetched and how, > User-Agent and everything are clear signatures of that browser. > As such, don't ever emulate. The above project would fit this quite well > (though we avoid any use of HTTPS due to the cert concerns above). > I was hoping we could do some cool client integration with selenium or firefox or something, but it's really out of scope of what I was thinking > [..some good stuff..] > > * So we have our file F, and a precomputed value Z which was the > > function applied Y times and has a hmac H. We set a cookie on the > > client base64("Y || random padding || H") > > o The server should remember which IPs which were given this Y > > value. > Due to the way that HTTP/HTTPS works today, limiting/fixing on IP is > near impossible. There are lots and lots of people who are sitting > behind distributed proxies and/or otherwise changing addresses. (AFTR is > getting more widespread too). > Also note that some adversaries can do in-line hijacking of connections, > and thus effectively start their own connection from the same IP, or > replay the connection etc... as such IP-checking is mostly out... Yes, I was being generic in this, it seems like I deleted my additional comments on this, it's relatively trivial to add more data into the cookie to associate the cookie with an accepted Y value. > This cookie should pretty much look like any session > > cookie that comes out of rails, drupal, asp, anyone who's doing > > cookie sessions correctly. Once the cookie is added to the > > headers, just serve the document as usual. Essentially this > > should all be possible in an apache/nginx module as the page > > content shouldn't matter. > While you can likely do it as a module, you will likely need to store > these details outside due to differences in threading/forking models of > apache modules (likely the same for nginx, I did not invest time in > making that module for our thing yet, though with an externalized part > that is easy to do at one point) I'm hoping someone with more domain knowledge on this can comment here :) But yeah, I'm sure it's implementable. > > o When rotating keys we should be sure to not accept requests on > > the old handlers, by either removing them(404) or by 403ing > > them, whatever. > Better is to always return the same response but ignore any further > Note that you cannot know about pre-play or re-play attacks. > With SSL these become a bit less problematic fortunately. > But if MITMd they still exist. Yes, we would obviously need to choose a single response option, I was just giving options. Hoping the MITM detection would prevent the client from ever making an action that could be replayable. But yes, mainly relying on determining if we're talking to the right server with the right cert and relying on TLS. > > o The idea here is that the webserver (apache/nginx) is working > > EXACTLY as a normal webserver should, unless someone hits these > > exact urls which they should have a negligable chance of doing > > unless they have the current shared secret. There might be a > > timing attack here, but in that case we can just add a million > > other handlers that all lead to a 403? (But either way, if > > someones spamming thousands of requests then you should be able > > to ip block, but rotating keys should help reduce the > > feasability of timing attacks or brute forcing?) > The moment you do a ratelimit you are denying possibly legit clients. > The only thing an adversary has to do is create $ratelimit amount of > requests, presto. Hadn't considered that, Good point. We could rely on probabilities, but I would prefer some kinda hellban ability once a censors ip has been determined (act normal just dont let their actions ever do anything) > > * So, how does the client figure out the url to use for wss://? Using > > the cache headers, the client should be able to determine which file > > is F. > I think this is a cool idea (using cache times), though it can be hard > to get this right, some websites set nearly unlimited expiration times > on very static content. Thus you always need to be above that, how do > you ensure that? I guess I should have outlined that clearer. F is determined by whatever file has the longest cache time of the document served normally, if they put it to 50 years, we use that one, if they put two to an equal time, then the client and server will just use the first one that appears in the document. We are not to generate our own files for the computation process as that will lead our servers to be identifiable. Plus remember we have the ability to change headers, so if they're setting everything to some invalid infinity option, we just change it to 10years on the fly, I don't see this being a blocker. > Also, it kind of assumes that you are running this on an existing > website with HTTPS support... Yes, the website will need to support https, but these days you're being negligent to your users anyway if you're not allowing them https. Does that clear any of your concerns at all? -------------- next part -------------- An HTML attachment was scrubbed... More information about the tor-dev
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319915.98/warc/CC-MAIN-20190824063359-20190824085359-00474.warc.gz
CC-MAIN-2019-35
7,613
124
https://learn.microsoft.com/en-us/previous-versions/office/sharepoint-server/ee559422(v=office.15)?redirectedfrom=MSDN
code
SPSite.QueryFeatures method (SPFeatureScope, Boolean) Gets a collection of the features deployed in this site collection with either Site or Web scope, including only features that either do or do not need to be upgraded. Assembly: Microsoft.SharePoint (in Microsoft.SharePoint.dll) 'Declaration Public Function QueryFeatures ( _ scope As SPFeatureScope, _ needsUpgrade As Boolean _ ) As SPFeatureQueryResultCollection 'Usage Dim instance As SPSite Dim scope As SPFeatureScope Dim needsUpgrade As Boolean Dim returnValue As SPFeatureQueryResultCollection returnValue = instance.QueryFeatures(scope, _ needsUpgrade) public SPFeatureQueryResultCollection QueryFeatures( SPFeatureScope scope, bool needsUpgrade ) An enumeration value that specifies the scope to which the feature applies. The only valid scopes for this method are Site and Web. If true, only features that need to be upgraded are included. If false, only features that do not need to be upgraded are included. An enumerable collection of SPFeature objects.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710801.42/warc/CC-MAIN-20221201053355-20221201083355-00528.warc.gz
CC-MAIN-2022-49
1,020
8
https://tf2maps.net/threads/how-to-get-started.18859/
code
Hello all! I'm new around here and new to mapping and level design as a whole. I've been reading all the tutorials as well as watching lots of videos on how to use Hammer, but one thing that seems to evade me or just isn't talked about is the process of how one goes from a simple idea to finally getting started on making the level. I have an idea for a map, but can't for the life of me figure out where to begin. I feel like I should plan something but that seems to evade me as well. Any tips on the subject or even guides/guidance would be appreciated. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584518983.95/warc/CC-MAIN-20190124035411-20190124061411-00116.warc.gz
CC-MAIN-2019-04
565
1
http://www.homebrewtalk.com/f128/double-check-my-water-adjustment-265703/
code
I think it is prudent to hold some out and add it in if and only if necessary. The problem with doing this is that the pH reading takes about 15 minutes to stabilize when sauermalz is used so don't take the first reading as an indicator of where you are. If you read, say, 5.2 initially wait to see how much it increases in 15 - 20 minutes before deciding whether to add the rest. You should only have to do that once or twice. After that you will know how much sauermalz is required and add that much at the outset (but still check with the meter).
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122123549.67/warc/CC-MAIN-20150124175523-00100-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
549
1
https://community.letsencrypt.org/t/2020-06-08-delegated-ocsp-signer-expiration-for-alternate-chains/125618/1
code
On 2020.06.08, we received a report from Miłosz Kaniewski with Fudo Security that our delegated OCSP signing certificate ‘OCSP Root-X1’ expired 4 days prior on 2020.06.04. This delegated signing certificate was reissued on 2020-06-09, 24 hours after the expiration was reported. During the period that it was expired but not replaced, TLS clients building chains to ISRG Root X1 would experience OCSP validation errors if checking OCSP and validating the signing certificate. The OCSP responses served by our OCSP responder were signed as valid until December 2020, but because the signing certificate had expired, validation of the response would fail. This affected the OCSP responses for the 2 non-expired intermediate certificates signed by ISRG Root X1: Let’s Encrypt Authority X3 and Let’s Encrypt Authority X4. All subscriber certificate OCSP responses are signed by the unexpired Let’s Encrypt Authority X3 and were unaffected. The root cause of this incident is that an internal tool we use to generate OCSP responses for our intermediate signing certificates had a design flaw. The tool was able to generate a response with an expiration date later than the expiration of the certificate doing the signing. Additionally, the delegated OCSP signing certificate was not being monitored for expiration which allowed the expiration to pass without being noticed. We have fixed the internal tool as a remediation item and will be adding better monitoring for the new certificate. Between 2020-06-04 00:00 UTC and 2020-06-09 00:00 UTC, there were 32,400,723 requests for the OCSP status of the affected intermediates, and 1,090,441,047 requests for the OCSP status of the cross-signed (unaffected) intermediates, leading us to estimate that approximately 2.9% of clients verifying Let’s Encrypt intermediates received an response with the expired OCSP signer during the outage. 2020-06-08 17:53 UTC - Security officers received an encrypted email with incident details. 2020-06-08 18:29 UTC - A security officer decrypted the email report and began an investigation. 2020-06-08 18:44 UTC - The reported problem confirmed valid for TLS clients building chains to ISRG Root X1. 2020-06-08 18:58 UTC - Let’s Encrypt Staff coordinated datacenter access and began key ceremony preparations to issue a new delegated OCSP signing certificate. 2020-06-09 19:04 UTC - Completed key ceremony to sign the new certificate. 2020-06-09 22:28 UTC - New OCSP responses generated and served by the OCSP responder. Incident Resolved. We apologize to our community for any errors they experienced while validating certificate chains to ISRG Root X1, and as always, will strive to do better in the future.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00615.warc.gz
CC-MAIN-2023-50
2,704
12
https://juji.io/education-chatbot/
code
AI can transform learning to maximize student success. Powered by super AI, Juji's education solution enables the best-in-class chatbots to aid both students and instructors and deliver superioruser experience and learning outcomes. These chatbots are also faster to build and easier to be integrated with other education applications. With active listening skills, Juji chatbots can help educational organizations engage with their audience (e.g., existing or prospect students) 24x7, answering questions and providing just-in-time assistance. Juji chatbots can also read between the lines to truly understand each student as a unique individual. This enables Juji chatbots to serve as a student's personal learning assistant or an instructor's teaching assistant, to personalize teaching and optimize learning outcomes. Like creating PowerPoint slides, design a main chat flow containing key steps, each of which is a chatbot-initiated action. Customize each step, e.g., to gather student information or teach student a particular topic. Follow this step-to-step guide to enable chatbot Q&A for intended users, e.g., students or instructors. If your chatbot just needs to support Q&A, you can skip STEP 1. Juji automatically aggregates and analyzes demographics data and visualizes the summary. So you can get a quick glance on where users came from and when they interacted with the chatbot. Juji analyzes free-text chats and automatically infer user unique characteristics on the fly. Such insights can then be used to deliver personalized learning experience (e.g., suggesting suitable learning method or materials) Education chatbots can be used to automate many tasks related to learning processes, such as learning delivery and program management. Check out each of the use cases below. For an educational institute, I am made to serve its students, faculty members, and staff. I can answer diverse questions, such as admissions process, program requirements, and school policies. For an online-learning business, I am made to serve its students and instructors, answering diverse questions, such as membership information, refund policies, and payment method. In general, consider me a customer service chatbot made for education. I am made to be a personalized chatbot that helps a student in his/her learning process or during the moment of need. I can answer student questions, including complex questions involving multi-turn interactions, such as canceling a course or finding a matched tutor. Because I understand a student's unique learning style and learning needs, I also provide proactive, personalized gudiance, such as recommending suitable learning method or materials. I am made to aid an instructor in helping his/her students. My tasks include answering student questions about a particular course, sending instructor reminders, and collecting student feedback. If I have access to learning materials, I can also serve as a personal tutor to help students in their course work. Because I understand each student well, I can easily adapt my tutoring to each student's unique style and needs.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107872686.18/warc/CC-MAIN-20201020105000-20201020135000-00266.warc.gz
CC-MAIN-2020-45
3,115
15
https://kolaente.dev/vikunja/frontend/issues/246
code
No list colors in overview / next week / next month I assigned different colors to my Namespaces but in the overview no colors are used at all. I would really like to have a color indication so that I can see more quickly which namespaces my todos are in. Sounds reasonable. What do you think would be a good way to show the colours in the overview? Maybe like it is done in the menu? Do you want to send a pr? Yes, a round circle with the right color in front of the checkbox would be nice! Also that would give a consistent UI feeling in my opinion. I can try to submit a PR, but my Vue knowledge is very limited to be honest :-) Let me take a look at it and I'll let you know if a PR is feasible for me Correct me if I'm totally wrong, but a span like this: would go between this div and the fancycheckbox here: but with not with I think I would need to get the right color with something like this: Just to make sure I understood you correctly: You want to show the color of the list the task belongs to in the task overview? Or the namespace color? The namespace color does not really make sense imho and then there's also the color of the task itself. We somehow need to differentiate the two to avoid confusion for users. In general your code starting point would be correct however - You need to make sure the color span is only shown if there is a color - You would also need to make sure the color is only shown in the overview and not in the task list per list as that would probably create confusion for users. I mean like in the attached picture, maybe it makes sense to put the color bubble in between checkbox and listname. I just now realized that I mixed namespace and list in my issue, sorry for that 😕 Ah, now I understand. I thought you were talking about the namespace overview 🙂 I updated the title of this issue accordingly. Now that I understand what you meant, I think it would be better to put the color bubble next to the name of the list in that task, that way we could avoid confusion with task colors. I tried a bit to achive this but couldn't manage to get it to work 😞 Is there any chance that you realize this feature request? Deleting a branch is permanent. It CANNOT be undone. Continue?
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154219.62/warc/CC-MAIN-20210801190212-20210801220212-00208.warc.gz
CC-MAIN-2021-31
2,231
26
https://dariasworld.info/real-chat-rooms-no-bots.html
code
Real chat rooms no bots Lonely Looking Women For Sex Tonight Need To Bust A Load. Prefer Free Discreet Dating Hole In contrast, chat bots are automated programs deed mainly to interact with chat users by sending spam messages and URLs in chat rooms. Real chat rooms no bots Mature Single Wants Dating Nudes Blonde Women Wanting Sex Sluts This recently-added feature is to guard against a room source of abuse—bots. The recent chat systems improve user bot by using graphic-based interfaces, as well as adding attractive features such as avatars, emoticons, and audio-video communication capabilities. So far, the efforts to combat chat bots have focused on two different approaches: 1 keyword-based filtering and 2 human interactive proofs. Although very successful, Bayesian-based spam detection techniques real can be evaded by carefully crafted chats [ 402218 ]. In our classification process, the examiner observes a long conversation between a test subject a possible chat bot and one or more third parties, and then decides if the subject is a human or a chat bot. In short, these upgrades made the chat rooms difficult to be accessed for both chat bots and humans. Skype Help sexy sister Andi The main criterion for being labeled as botd is a high proportion of specific, intelligent, and human-like responses to other users. The process of reading and labeling these chat logs required about hours. Although having been used by botnets as command and control mechanisms [ 112 ], IRC and other chat systems do not play an irreplaceable role in botnets. We recommend adding the list of Skill IDs as a comment for reference. Set the SObject Type to Skill. A Stranger-web: The Death and Rebirth of the Chatroom sexy sister Andi The second is the repetition of similar phrases either over time or from other users other instances of the same chat bot. With this in mind, we outline some related work on IM systems. The abuse of chat services by automated programs, known as chat bots, poses a serious threat to on-line users. You can identify the Chat Button ased to the bot by roooms the Deployments section of the Bot Overview. Although a Turing test is subjective, we outline a few important criteria. The two classifiers complement each other in chat bot detection. Based on the measurement study, we propose a classification system to accurately distinguish chat bots from human users. In addition, our examiner checks the content of URLs and typically observes multiple instances of the same chat bot, which further improve our classification accuracy. Our experimental evaluation shows that the proposed classification system is highly effective in differentiating bots from humans. Our logs also include some examples of malware spreading via chat rooms. However, we consider the contents of the chat logs to be sensitive, so we only present fully-anonymized statistics. Add a Rule Dialog Step without conditions. In this paper, we first conduct a series of measurements on a large commercial chat network. Although IRC has existed for a long time, it has not gained mainstream popularity. If an agent is available to take the chat, the bot transfers to the agent. Our data was collected between August and November of Based on these two metrics, we profile the behavior of human and that bota chat bots. Like spam, chat spam contains advertisements of illegal services and counterfeit goods, and solicits human users to click spam URLs. To add a set of skill IDs to a list, create an Apex class. In contrast, the machine-learning classifier is mainly based on message content for detection. 12 Best Live Chat Software for Small Business Compared () sexy sister Andi There are two approaches that chat bots use to distribute spam links in chat rooms. Our study is carried out on the Yahoo! The machine learning classifier cjat less messages for detection and, thus, is faster, but cannot detect most unknown bots. Moreover, the entropy classifier helps train the machine-learning classifier. If all agents are at capacity, the bot reviews the settings of the Chat Button record ased to the bot to identify the queue size. However, with the commercialization of the Internet, the main enterprise of chat bots is now sending chat spam. Ladner online chat room without registration I Looking Sexy Meet The keyword-based message filters, used by third party chat clients [ 4243 ], suffer from high false negative rates because bot makers frequently update chat bots to evade published keyword lists. Bot Behavior in Messaging Bots check for available agents differently depending on the channel. Chat bots exploit these on-line systems to send spam, spread malware, and mount phishing attacks.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060882.17/warc/CC-MAIN-20210928184203-20210928214203-00171.warc.gz
CC-MAIN-2021-39
4,702
24
https://discourse.panda3d.org/t/deploy-ng-application-script-cant-have-the-same-name-as-a-local-package/24665
code
It’s not an issue, just a warning to future deploy-ng user as it’s an easy to fall in trap If your application has the following structure : my_app.y is importing code from my_app.something package. When you manually run your application it will work without problem, however when generating a binary using deploy-ng, it’s won’t work at all, and you will have something like ImportError: No module named my_app.something in the log. This is caused by the fact that deploy-ng is actually importing my_app.py as a module and so the package my_app is shadowed by the main script. TL;DR: Don’t use the same name for your main script and application package This is a little odd. I thought deploy-ng would be packaging the main module under the name of __main__ (which is also necessary for the __name__ == '__main__' check to work). Could it be that my_app.py is also being picked up unnecessarily, despite not being imported by your main code, due to an overly aggressive include pattern? Or perhaps the modulefinder needs to be ignoring my_app.py from consideration when scanning the import my_app inside my_app.py, since a self-import is obviously bogus. That said, it is generally fairly wise not to give a package and a module the same name; anything else in this directory that has an import my_app would also be ambiguous. I don’t thing it’s an aggressive include pattern, It can be trivially reproduced with the asteroids sample where only the assets are included : just rename main.py as asteroids.py, add a dummy asteroids package and import something from it in asteroids.py
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00461.warc.gz
CC-MAIN-2022-27
1,595
20
https://pragmaticworks.com/Training/On-Demand-Training/Introduction-to-Power-BI
code
This class is designed to get you up to speed on the latest with Power BI. First, you will learn how to query and pull in data, and then organize the results into a data model with relationships and calculations. Finally, you will learn the best way to visualize your data through a variety of charts, graphs, maps and gauges that are provided. This class exclusively uses the Power BI Desktop application to create solutions that are deployed to the Power BI Service and are then visible from any device. Because this class is focused on self-service end user solutions, previous SQL Server knowledge is not required. While it’s not mandatory, ideally students should have a basic understanding of database terminology, such as tables, views, columns, rows, relationships, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527518.38/warc/CC-MAIN-20190419081303-20190419103303-00086.warc.gz
CC-MAIN-2019-18
780
2
https://doc.castsoftware.com/export/AIPCONSOLE/Application+-+Config
code
Summary: This section describes the how to apply configuration options to an Application for which a Version exists and has been Set as current version. When a Version exists and has been Set as current version for a given Application, you can then access configuration options to help you fine-tune the settings before you generate a snapshot. Access the options Move to the Console screen if you are not already there: Locate the Application and click it: Click the Config icon on the left to access the options: Panel options and banners The option allows you to run actions such as analysis, upload to Imaging, upload Dashboards: Not available when using Workflow - Application onboarding with Fast Scan. Following an initial deep analysis when working in Workflow - Application onboarding with Fast Scan, any change to the application configuration, for example: - addition of an Architecture Model - reviewing of Dynamic Links - addition of an Update Application Schema job - transaction configuration - module configuration etc. will cause a banner to be displayed (when any tab is in focus) to inform you that a configuration change has been made and that your data should be updated. If the "Update" button is clicked, then a job will run to ensure that all data is correct and prepared ready for the next upload to CAST Imaging job:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00140.warc.gz
CC-MAIN-2024-18
1,342
16
http://gaming.stackexchange.com/questions/10165/is-there-a-way-to-transfer-resources-from-one-island-to-another
code
One of my islands has a lot of rock and wood that some of my other islands could use. Is there any way to transfer stuff? Or is there any way planned in the future? Go to your dock and transfer there. You can transfer TO an island that doesn't have a dock, but not FROM an island that doesn't have a dock.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824345.69/warc/CC-MAIN-20160723071024-00194-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
305
2
https://support.brightsign.biz/hc/en-us/community/posts/10024057480091-BA-connected-interactive-presentation-show-website?sort_by=created_at
code
I integrated the URL of an external website via HTML5 widget into my presentation. Everything is working fine - BUT: loading time is very long. It takes up to 10 seconds until the website shows. There is almost no difference between a very simple and a complex website. Any idea how to proceed or any smart idea how to cover the loading time?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00538.warc.gz
CC-MAIN-2023-14
342
2
https://srilals.medium.com/getting-started-with-firestore-flutter-android-31bee8c1412c?source=user_profile---------5----------------------------
code
Getting Started with Firestore + Flutter (Android) Firestore, the Firebase’s No-SQL Database + Flutter is a Excellent solution to bring Cloud database connected apps to life. in this tutorial we will discuss how to add Firestore to Flutter Project Adding Firebase to Flutter First Create a Firebase Project and Add Your App to Firebase. Change App ID to something Unique. (/android/app/build.gradle), Add it to the Firebase as follows, Download the Config file and put it in the “/android/app” folder as Follows, In Your Flutter Project add the Following to the Project Level Gradle.build file. (/android/build.gradle). Then Add the following to the end of the App level Build.gradle file (/android/app/build.gradle) apply plugin: ‘com.google.gms.google-services if You want to enable analytics as well, add the following to the dependencies section of this file. Finally apply the Firestore plugin to flutter as below. (use the latest version from https://pub.dev/packages/cloud_firestore ) in the pubspec.yml file add the following to dependencies section. if you are using a IDE with flutter plugin installed, once you save the changes it will automatically install the dependencies. otherwise run ‘flutter pub get’. then in the dart file/screen you want to use Firestore, initialize the Firebase Firestore as follows. Now Check back in the Firebase Console to See Your App. Congratulation! You have added Firestore to your Flutter application.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00356.warc.gz
CC-MAIN-2023-23
1,459
16
https://opmjobs.com/job/unity-developer-rendering-network/
code
Job ID: #23129 OPM are looking to find a number of experienced Game Developers open to a fresh challenge and joining one of the UKs most innovative studios. Reknowned for their diverse portfolio of Games they have new projects currently in development and are in the process of expanding their teams. As part of the programming team on an unannounced project and future projects you will be responsible for delivering great gameplay that feel amazing to the game players. You will be a seasoned programmer who can handle difficult problems and bring your development experience into new and innovative solutions. DUTIES AND RESPONSIBILITIES Coding great gameplay experiences for players as well as tools for your colleagues to build great games. Designing code architecture, implementing, debugging, optimizing system to extend the game feature set. Ensuring quality of the code you write, creating amazing gameplay experiences in a clean, efficient, and polished way. Helping your team at large with solving technical issues. Supporting your fellow programmers with code, design reviews and mentoring. Participating in all of bossa’s games life cycles with suggestions and feedback as well as generating new game concept during our regular gamejams. SKILLS AND EXPERIENCE Care for providing great experience to players, proving out great ideas never seen before and growing them together with our gaming community. Yearning for improvement through honest feedback from your peers and the community. Belief that “the best way” is not written in stone and changes for the better are welcome. Passion for making and playing games across genres. Creative, innovative, and conscientious in solving complex technical problems. Focused but adaptable; flexible and open to change within a fast-paced team environment. Experience with delivering gameplay for games, especially in the areas of Character control, animation, camera control or overall look and feel, having worked on those system on multiple released high quality titles. Experience with making games with Unity using C# for a few years. Experience with rapid prototyping and agile or iterative game development. Used to work in teams, with an appreciation for all the different skills needed to build a game. Comfortable use of Source control Opportunity to work on new original concept or ideas. Help challenge what games get made and how they get build. Regular Gamejams, changing the daily game development, allowing for experimentation and seeding all new ideas going into development. Categories: Programming , Technical We’re proud to be partnering with MCV/Develop to bring you the 2022 30 Under 30 – this time with a… OPM are finally heading back to Germany to attend gamescom 2022! Kim, Hannah and Jon will be arriving in Cologne… Copyright © 2022 OPMjobs Ltd. 408 Wellington House, 90-92 Butt Rd, Colchester, CO3 3DA, United Kingdom
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335362.18/warc/CC-MAIN-20220929163117-20220929193117-00121.warc.gz
CC-MAIN-2022-40
2,914
31
http://amcrouch.blogspot.com/2008/11/next-version-of-ie-to-use-webkit-maybe.html
code
So the George Bush of the propriety software world, Steve Ballmer, was in Sydney talking to Microsoft developers when one clearly gifted individual stood and asked the following ... "Why is IE still relevant and why is it worth spending money on rendering engines when there are open source ones available that can respond to changes in Web standards faster?" Ballmer's reply? "That's cheeky, but a good question, but cheeky". He then went to to say "There will still be a lot of proprietary innovation in the browser itself so we may need to have a rendering service," No surprise there then.... but then came... "Open source is interesting, Apple has embraced Webkit and we may look at that, but we will continue to build extensions for IE 8." So is he saying that Microsoft could one day ship a WebKit based browser? From the earlier comment that would require Microsoft to develop WebKit to work with their extensions and plug ins and would they give them back to the Webkit project. Would the WebKit dev's want the changes to be back ported? Could they even be backported without Microsoft giving away details of the inner's of IE. Interesting questions which will probably never have to be answered.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824119.26/warc/CC-MAIN-20181212203335-20181212224835-00167.warc.gz
CC-MAIN-2018-51
1,205
8
https://forum.vivaldi.net/topic/29800/increase-max-width-of-vertical-tab-bar/?lang=en-US&page=2
code
Increase Max Width of Vertical Tab Bar @potmeklecbohdan Could you elaborate? I'm not so familiar with Vivaldi's CSS. Do you have a MWE with this workaround? Thanks! @simokron There’s nothing like a MWE. Either it’s complete, or it isn’t. Doing it cleanly means at least a day of work… finding all selectors for common.css, checking what they change, writing a new style that changes it back — & takes care of the tabs position. Otoh, maybe it could be solved with something simple — just getting rid of these two classes… @potmeklecbohdan I see, thanks! I'll see if I can find the time to fiddle with it a bit over the weekend. If you think of something clever or can point me somewhere I can find out how do remove the classes, please let me know. potmeklecbohdan last edited by potmeklecbohdan @simokron Hmm, I’ve just found a way — & I’m not looking for any other. The primary tab bar must be narrower than 230px, or even better @potmeklecbohdan Hmm, that doesn't sound right. Isn't the default maximum 260 px? i.e., it will be narrower than that even? Also, when I try, e.g., 194 * 2 = 388 as the total width and 194 for flex-basis, I still get the thing where when I hover over the selected tab in the submenu, the text disappears. Edit: But it does actually work with 380 and 190. So for now I guess I'll just use that. Thanks again! @simokron The narrower than was exclusive, i.e. 230 or 194 is still too wide. The reason for this is this: - the tab bar can be only 260 px wide (normally) .tab-smallwhen they’re 66 px or narrower & .tab-miniwhen 30 px or less - that width is computed with the expectation that the tab bar can be at most 260 px, so the secondary tab bar ‘definitely has to’ be what stays when you remove the width of the primary bar Now that I’m thinking of it, it probably considers the configured width (what you’ve drag-resized it to) instead of 260 px → that might be another reason why you get other results. @potmeklecbohdan Thanks for the excellent explanation and the tip! I'll give that a shot! Edit: I can confirm that it indeed considers the adjusted setting. I already had it maxed out (386 px total and 193 px flex-basisis the way to go for me), but if I made the original bar much narrower, it indeed disappeared with much lower values than these. Here is the way to increase tab width limit that I personally use. Warning: This method is for experienced users only! You can easily break your browser UI! Proceed on your own risk! Note: Tested with Vivaldi 4.0. Instead of editing CSS files I edit bundle.jsfile. Here are the steps: bundle.jsin Vivaldi installation directory. It varies between operating systems. For example, on MacOS the location can be: Obviously, the version number will be different for each new version of the browser. - Important! Back up the original file before you make any changes. - Close Vivaldi (ensure the process is not running) and open bundle.jsfile with your favourite text editor. Note: With every minor release (e.g., 3.5 -> 3.6) the contents of bundle.jschanges significantly. It takes a combination of intuition and experience to edit the right place. That's why making backups of - Search for 362(enable "whole word" feature in your editor to reduce false positive results). Find places related to tab width and change them to a bigger number of your choice, say - It is usually few places that you need to edit. As of Vivaldi 4.0 I had to edit the following places (snippets): r.maxWidth=360<-- Note the 360 width bundle.jsand start Vivaldi In practice it is not as cumbersome as it may look from the description. It takes me a couple of minutes at most to edit bundle.jsafter every browser update. However, it is very annoying. This 362constant is clearly somewhere in the source code as a single variable and it should be very easy to update it to a bigger number. @Tinsmith Thanks for the detailed description! If I feel a strong urge for a width above 386 px, I'll make sure to give it a try! @simokron Thanks! I like this method because it doesn't set the width of the tab bar, but increases the limit instead. The tab bar itself remains resizable. @Tinsmith That is definitely a nice bonus! This just became essential with the introduction of two-level stacking.. The solution proposed by @potmeklecbohdan makes the tabs wide, but not the bar itself for me. Any update on this? Exactly this. How is it possible that a browser that supports two vertical tab bars side by side also limits them to a 100 px each? In a world with 4K monitors? Absurd. @Tinsmith Just tried that, works like a charm! (Until the next update...) dfleisch last edited by @Tinsmith: Tried your bundle.jshack and it did unlock the tab bar, but the change is only for the entire bar (i.e. the main tab stack is still limited to 260px). This is going to work fine for me, since I decided to just widen the bar a bit and make the first tab bar collapse to favicons when inside a stack, but it is very silly. You can't see anything when the default bar is split in two. I guess they are pushing people to a top tab bar, but the left side makes way more sense with (ultra)wide monitors when you want to see more of the tab names. oh well @dfleisch , I agree with you. This method is far from ideal. I rarely use two-level stacking, so it is somewhat tolerable trade off for me. I don't know if Vivaldi moderators read it, but the proper solution here is to stop reverse engineering bundle.js. Instead, relax the limit! Maybe many years ago, when Vivaldi just started, the 1024x768 resolution was mainstream and 260px looked kind of OK. But now this limit is just too narrow for modern screens. BTW, this limit is applied in other places. For example, "Any command" window (Ctrl+E). It is fixed width window of 260px, which often too narrow to see entire title of historic pages, so it is impossible to pick the right page. @Tinsmith with introduction of subtabs bar look for 230 px also. Because after opening that subtabs bar they have wide width but main tab bar have fixed with = 230 px. @OperaDevs - And even after fixing that fixed 230 px I was disappointed with that subtabs bar behavior. It's opening "eats" main tab bar space not page, so you need to have very wide main tab bar to have readable subtabs bar width. @potmeklecbohdan My mistake. VivaldiDevs +1, this would be a really good feature. Current width limit is far too small, only reason I can think of for this limit is to avoid issues when the window is resized to have a smaller width than the tab bar. On my machine, the minimum width for the browser window is about 500~550px. However, when I activate something from the side panel (bookmarks, downloads, etc) the browser seems to resize the tab bar just fine. @Vivaldi please remove the size limit. If i want to make it 90% of my window size, i should be able to do so. This limitation is one of the biggest downsides since i started using Vivaldi right after the first release.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057496.18/warc/CC-MAIN-20210924020020-20210924050020-00016.warc.gz
CC-MAIN-2021-39
6,986
67
https://www.iptv-m3u-list.com/2018/07/latino-iptv-lista-canales-2018-gratis.html
code
What is IPTV? What does IPTV mean? This is IP television, or IPTV, or IPTV (Internet Protocol Television) is a form of television broadcast over a network using the Internet Protocol. M3U what is? M3U is a file format that aims to store a list of addresses, audio files or video files for play IPTV Latino Channels. I'm not responsible for lists or channel updates, I only share my knowledge. So Lists are functional at the time of posting. Download Latino IPTV iptv iptv latino 2018 iptv latino android iptv latino descargar gratis iptv latino en vivo iptv latino listas m3u iptv latino m3u iptv latino para pc iptv latino pc iptv latinos spanish-iptv-playlist
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662124.0/warc/CC-MAIN-20190119034320-20190119060320-00442.warc.gz
CC-MAIN-2019-04
661
7
https://developer.yahoo.com/forum/Y-OS-General-Discussion/YUI-Loading-Mask-Creating-Scroll/1242066278000-1a5cb160-1ee5-3ed5-9f55-fb086b1763ee
code
YUI Loading Mask - Creating Scroll bars in the Safari browser. Hi Yahoo Guys.. Subject : I am facing an critical issue in the Safari. Let me explain this in detail. we are including one external file through iframe in to PHP page, after the page gets loaded iframe scroll bar is not visible in the screen even though we have given scrolling='no' in iframe inline style. Suppose if we click and scroll the iframe using mouse we are getting an scroll bar. Suggest us a nice solution for this. We have included only the files which we have downloaded for YUI Loading Mask from Yahoo site nothing other than that. Kindly send us a Solution ASAP. With Regards Team Mates --- Lovable Yahoo scripts Team.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609521558.37/warc/CC-MAIN-20140416005201-00286-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
697
7
https://innerwonderlust.com/product/reduce-insomnia/
code
|Healing Service For|| For Myself, For Someone Else ( Please enter Name and date of birth in customer Notes) 15-20 min Session, 30-35 Min Session, 45-50 Min Session, 6-7 Hours Session |Number Of Session|| 1 Day, 2 Days, 3 Days, 4 Days, 5 Days, 6 Days, 7 Days, 8 Days, 9 Days, 10 Days ₹300.00 – ₹5,500.00 We have more work and less time in the modern world. Because of the stress and urgency this lack of time causes in our lives, insomnia often results. There are many causes of insomnia, but in the majority of cases, planets, as well as the aura and chakra, play a critical role. We treat each one of them using a particular procedure so that you can experience relief from insomnia. SKU: N/A Category: Healing Service Only logged in customers who have purchased this product may leave a review. Shipping & Delivery
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00855.warc.gz
CC-MAIN-2023-50
823
13
http://www.nisamerica.com/forum/viewtopic.php?f=59&p=440004
code
AmyF wrote:Dooes anyone know how to shorten travel time? As in an accessory? I'm in year 4 so I'm getting a lot of new locations that take like 17 days I got a recipe to make a special synthesis Equipment Basket. You place it in the basket like an item then just choose to equip it to expand the amount of slots. I'm probably not at the point to trigger a special travel item recipe. maybe a specific character knows it? still no accessories to buy yet, just recently unlocked weapon synthesis. I guess it's just a matter of talking to the right people at certain point, and stuff.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163051776/warc/CC-MAIN-20131204131731-00081-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
581
2
http://yapadai.xyz/archives/7677
code
Fantasticnovel War Sovereign Soaring The Heavens read – Chapter 3127 – Duan Ling Tian Attacks use bang read-p1 Novel–War Sovereign Soaring The Heavens–War Sovereign Soaring The Heavens Chapter 3127 – Duan Ling Tian Attacks tender empty “Escape?” Duan Ling Tian was slightly startled when he been told Hong Ji’s ideas. A faint smile sprang out on his deal with when he claimed, “When have I say I want to escape? Considering the fact that two of you have no purpose of hurting me, I’ll go effortless on the two of you. Don’t restrain once you assault.” Toward the end of his terms, his look expanded larger. The Precious metal Type Profundity would shroud its person together with the Celestial Origins Vigor which had been boosted while using Precious metal Elemental Profundity. With this, the user’s sturdiness, rate, and strike could well be boosted whether or not one did not use Celestial Origins Vigor to attack. “No, I didn’t.” Tong Qi Shan shook his travel before he reduced his voice and said, “If I’m not wrongly recognized, he got used the law of s.p.a.ce’s Teleportation Profundity sooner. The Teleportation doesn’t use up one’s Celestial Origin Electricity and allows one to teleport to anywhere within the 100-meter radius with the rudimentary period. The better one’s farming starting point is, the smaller the cooldown time period in between each use might be. Even though the profundity doesn’t use one’s Celestial Origins Strength, its cooldown period of time depends on the amount of one’s Celestial Beginning Energy.” Based upon his words, it was subsequently obvious he experienced a particular volume of familiarity with legislation of s.p.a.ce’s Teleportation Profundity. Section 3127: Duan Ling Tian Problems Within a blink of an eye, the void inside a part from the vicinity where Duan Ling Tian acquired cast Restraining Profundity suddenly tore. the gilded age big business & conditions of labor “Territory Profundity!” Duan Ling Tian suddenly came out behind Hong Ji. Simultaneously, vitality surged from his body and shrouded the location within 100 yards of Duan Ling Tian at lightning rate. Then, the raging vitality swept toward Hong Ji, abandoning a lot of dents on his armor. “How did he turn out there? Have you capture his moves?” Hong Ji required Tong Qi Shan after he gulped. latin quarters owner “The Steel Fashion Profundity?” Duan Ling Tian narrowed his eye. He knew the profundity that Hong Ji possessed cast. “Break!” Hong Ji cried out. Glowing lightweight surged out of his system all over again, modifying into saber sun rays. He clearly developed to bust out from his restraint while using saber rays’ penetrative pressure. “Lad, these days I’ll educate you on a session on behalf of your senior citizens. A weakling just like you shouldn’t be conceited!” Hong Ji’s human body seemed to flicker and enhance in to a streak of great lightweight that chance out similar to a photographing superstar falling across the atmosphere. The environment around Hong Ji seemed to lock up at this moment, departing him powerless. Then, electricity produced in the distortion of s.p.a.ce swept toward him, shattering his aluminum armor. Even though he was stunned by Duan Ling Tian’s techniques, he did not drop aim. Less than these types of circ.you.mstances, he was aware he could not afford to be sidetracked. “He’s really fortunate enough! He needs to have comprehended the Teleportation Profundity when he comprehended what the law states of s.p.a.ce’s s.p.a.ce Elemental Profundity. If his farming basic is similar to ours, you can only dream about catching him. Nonetheless, he’s not even a hundred years old so his cultivation starting point has to be under ours. On condition that his Celestial Origins Vitality is weakened than ours, we will still be capable to grab him even if he casts the Teleportation Profundity,” Tong Qi Shan explained confidently. His eyeballs flashed nearing the end of his sentence. “Restraining Profundity! Distortion Profundity!” Before Hong Ji could react, Duan Ling Tian cast another two profundities coming from the rules of s.p.a.ce. “Go uncomplicated for both people?” Duan Ling Tian’s words angered Hong Ji and Tong Qi Shan. Not alone was this outer the courtroom disciple out of the Intense Nether Mansion unappreciative of these good objectives, but he even stated he was going to go uncomplicated about them? Was he daydreaming? “T-territory Profundity? Restraining Profundity? Distortion Profundity? Cross-Dimensional Cut Profundity?” Tong Qi Shan was amazed. Hong Ji was shocked as he found Duan Ling Tian vanis.h.i.+ng into lean air flow which he forgot to withdraw his assault. “What form of strategy is that?” “T-territory Profundity? Restraining Profundity? Distortion Profundity? Cross-Dimensional Slash Profundity?” Tong Qi Shan was stunned. Hong Ji had taken an in-depth breathing to reduce the anger boiling as part of his human body. He considered Duan Ling Tian and coldly reported, “Lad, it looks like basically if i do not teach you a idea, you’ll never learn there will be persons stronger than you on earth. Let me teach you the visible difference between an outer courtroom disciple in the Profound Nether Mansion along with an essential disciple coming from the Leaving Willow Mansion!” The moment he finished communicating, wonderful lightweight burst forth from his physique, and then he was bathed entirely within the dazzling great lightweight. Gold super bolts could possibly be observed flas.h.i.+ng around his physique, supplying him a formidable aura. “Territory Profundity!” Duan Ling Tian suddenly came out behind Hong Ji. Simultaneously, vigor surged out from his body and shrouded the region within 100 m of Duan Ling Tian at super pace. Then, the raging vitality swept toward Hong Ji, abandoning many dents on his armor. the letter dionne warwick Within a blink associated with an eyesight, the void in a very part on the place where Duan Ling Tian had cast Restraining Profundity suddenly tore. Never Die Extra (Edited) “No, I did not.” Tong Qi Shan shook his head before he minimized his speech and mentioned, “If I’m not mistaken, he acquired applied legal requirements of s.p.a.ce’s Teleportation Profundity earlier. The Teleportation doesn’t take one’s Celestial Starting point Vigor and will allow people to teleport to anywhere inside of a 100-gauge radius in the rudimentary point. The greater one’s farming starting point is, the shorter the cooldown period in between each use might be. Although profundity doesn’t use one’s Celestial Starting point Strength, its cooldown phase relies on the amount of one’s Celestial Origins Energy.” Determined by his ideas, it had been very clear he got a particular degree of idea of legislation of s.p.a.ce’s Teleportation Profundity. Nonetheless, as soon as ahead of the saber ray landed on its concentrate on, Duan Ling Tian suddenly vanished into skinny oxygen.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00475.warc.gz
CC-MAIN-2023-14
7,075
29
https://mail-index.netbsd.org/port-i386/1996/04/20/0001.html
code
Subject: Pentium gcc patch To: None <[email protected]> From: Jeff Thieleke <[email protected]> Date: 04/20/1996 04:52:59 I am interesting to see if anyone else has tried the Pentium Compiler Group's <http://www-iss.mach.uni-karlsruhe.de/pcg/> patch (pl9) for gcc Out of curiosity, I applied the patch to the NetBSD 1.1B's gcc, and was pleasantly surprised that it applied fairly easily, except for the configure stuff and the slightly rearranged NetBSD version of gcc (fixed by a few symlinks). If you believe the PCG, pgcc will generate much faster code - they estimate 5-35%. My tests with gzip are a bit less optimistic, though. Using statically linked versions of gzip, one compiled with gcc and -O2 -m486, and the other compiled with pgcc and -O2 -mpentium, I got a speed improvement of 2.4% for compressing (-9), and 11.4% for decompressing. (my data set was the port-i386 mailing list archives 0-150, and the timing was taking from /usr/bin/time). The real surprise was the file sizes. I got adventurous and compiled a kernel... Using the same configuration file and -O2, the gcc -m486 kernel was 947,986 bytes, while the pgcc -mpentium kernel was only 857,874! Overall, I've seen about a 5%-10% file size reduction, which is inline with the PCG's results. I have been using the pgcc kernel for about a day now, and so far so good. pgcc is pretty flakely at -O6 (doesn't seem improve speed anyway), but it built itself to stage 3 at -O2, so I'm fairly confident at that
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058456.86/warc/CC-MAIN-20210927151238-20210927181238-00404.warc.gz
CC-MAIN-2021-39
1,480
25
https://superuser.com/questions/155790/how-to-remove-addresses-from-thunderbirds-autocomplete-drop-down
code
When Thunderbird suggests email addresses for me as I type, there are many addresses there that I know are obsolete. How can I permanently remove them so they are never suggested to me again? You can find your answer here This one is about as counter-intuitive as it gets. The trick is that you don't delete auto-complete entries from the main Thunderbird window -- you delete them from the autocomplete cache as accessible from within a new email. - Turn auto-completion on - Open a new email - Within the email window, click the Contacts button (should create a pane at the left with the list of addresses) - Delete the entry you don't want. I've done this successfully on my machine.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00192.warc.gz
CC-MAIN-2023-50
686
8
http://unifiedpeople.ru/exadmin_sp2.en/conn_htm/notesconnp_grantreaderaccess.htm
code
Grant Reader Access to Notes Databases By default, when a Notes doclink is included in a message to an Exchange user, it is converted to an RTF attachment. You can also have doclinks sent as OLE attachments or, in the case of documents, views, and databases on Lotus Notes/Domino servers, as a Web hyperlink. When the doclink is sent as an RTF attachment, the connector's Notes user ID must have Reader access to the document associated with the doclink. This means that the connector must have Reader access to the database containing the document, to the view that the sender selected the document from, and to the document itself. If you configure the connector to send doclinks as RTF attachments, you must grant the connector Reader access to selected databases; otherwise, the attachment that is appended to the message will contain an error message. You can either add the Notes user ID created for the connector to an appropriate group in the Public Name and Address Book or update the Access Control List of each database directly.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488540235.72/warc/CC-MAIN-20210623195636-20210623225636-00255.warc.gz
CC-MAIN-2021-25
1,040
4
https://www.securemac.com/news/xcsset-new-mac-malware-infects-xcode-projects
code
XCSSET: New Mac malware infects Xcode projects Security researchers have discovered an interesting new variety of macOS malware that spreads by attacking Xcode projects. It’s called XCSSET, and in this article, we’ll tell you what you need to know about this unusual threat in order to stay safe. What is XCSSET? XCSSET is a suite of malicious components that spreads through infected Xcode projects. Xcode is a tool used by app developers to write software for Apple platforms. An Xcode “project” simply refers to the repository of files, information, and resources that are used to build an app for deployment. If an Xcode project has been infected with XCSSET, and is used to assemble an app for distribution, the malicious code — unbeknownst to the developer and their end users — will be included in the official version of the app! When the app is run, the malicious code will execute. In addition, because developers often share their Xcode projects with one another through public code repositories such as GitHub, an unsuspecting developer may inadvertently incorporate an infected Xcode project into their own app, thereby helping XCSSET to spread even more widely. How does XCSSET work? There’s one big unknown surrounding XCSSET: At the moment, no one is quite sure how it infects Xcode projects in the first place! But that rather significant mystery aside, we do know a good deal about how it works. Once an infected app is run, XCSSET’s malicious code contacts a command-and-control (C&C) server operated by the bad guys. The malware downloads its main malicious payload from the server, and then the real attack begins. XCSSET first sends basic system information back to the C&C server, and kills a number of web browser-related processes. It then uses macOS’s osacompile command to build fake versions of well-known apps like Safari. It uses a few other tricks to make the fake apps appear genuine, in the hopes that the user will launch them so they can perform malicious actions. The malware also leverages a couple of 0-day vulnerabilities to expand its capabilities. The end result is a feature-rich suite of malicious tools that can be controlled remotely by the attackers. How does XCSSET affect Mac users? XCSSET is a powerful piece of malware that has the potential to wreak havoc on an infected Mac. Here is an overview of its major capabilities: Data theft and Surveillance XCSSET uses one of its 0-day exploits (having to do with the macOS data protection mechanism known as Data Vaults) to read and steal Safari cookies. A second 0-day (related to a flaw in Safari for WebKit Development) can be leveraged to steal the user’s Apple ID, Google, and PayPal credentials, as well as credentials for several other services. The same exploit also allows the malware to abscond with user credit card data associated with the Apple Store. In addition, XCSSET contains modules capable of exfiltrating user data from popular note-taking apps like Evernote and Notes, as well as messaging apps like Skype, Telegram, WeChat, and QQ. It can also take screenshots of the user’s system and of certain websites. The technical brief provided by the security researchers who discovered XCSSET says that the malware can perform code injection on other major browsers as well. In addition to the above capabilities, this malware also appears to contain ransomware modules that allow it to encrypt files on an infected system and display a ransom note, if it receives a command to do so from its C&C server. While still relatively uncommon on macOS, ransomware is a growing threat to the platform, as evidenced by XCSSET and other recently discovered malware. How can I stay safe? So far, XCSSET has only been found in a few places online. But given the aforementioned possibility of propagation through GitHub repositories, and the malware’s powerful set of features, this threat is nothing to take lightly. The best way to protect yourself is to only download apps from two places: the Mac App Store, and the official websites of reputable, well-established developers who you know and trust. Apple will be able to scan new apps submitted to the App Store for malicious code; and seasoned, security-conscious developers will already be aware of this issue and will be checking and rechecking their own Xcode projects for any signs of trouble. In addition, you should use a reliable, regularly updated anti-malware tool that can detect and stop XCSSET. MacScan 3 has already been updated with definitions for XCSSET, and is available as a 30-day free trial if you’d like to scan your system for peace of mind.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00674.warc.gz
CC-MAIN-2024-18
4,645
23
http://www.amember.com/forum/threads/protected-the-wrong-folder.14717/
code
I just bought and installed aMember v4.1.15 yesterday, and in playing around with it and trying to better understand protected folders, I accidentally set aMember to protect the folder directory that has my Wordpress installation in it (public_html/members). As a result, when I attempt to access the login for the WP Admin Dashboard, I get redirected away to the aMember sign-in page because of the protection settings. Likewise, it appears that images, CSS, and other page elements no longer load on the main page of the WP blog - I imagine because of the same reason. To try and undo this gaffe, I did as recommended in the program and deleted the folder record I created, then went to Utilities -> Rebuild Db -> Rebuild Core Database. Unfortunately, this didn't help. I also tried Rebuild Wordpress Database, but to no avail. I then tried to create a folder record to temporarily allow free access to /members just to see if it made a difference and (after rebuilding the database) unfortunately there was no change. After that, as a last ditch effort, I deleted the aMember directory on the server, reinstalled it to the same location (public_html/amember), and went through setup a second time, but the same problem persists. What can be done to fix the situation? Thank you so much for your time and help!
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512382.62/warc/CC-MAIN-20181019082959-20181019104459-00557.warc.gz
CC-MAIN-2018-43
1,312
1
https://techcommunity.microsoft.com/t5/project-blog/february-project-update-blog/ba-p/2175381
code
We’re starting trivia this month to help people learn more about Microsoft Project & its history. Leave your guesses to these questions in the comments & check back next month to see if you were right! Question: What year was Microsoft Project first released? Bonus: How many Windows applications did Microsoft release before Project? Reimagine Project Management with Microsoft Microsoft Project is hosting a free digital event to help our users learn more about how to leverage Project, Microsoft Planner, and Dynamics 365 Project Operations to best manage your projects – both big and small! This includes 6+ hours of on-demand demos and product walkthroughs to help you discover and leverage new features and learn best practices to keep your projects on track. Get tailored guidance directly from the engineering teams behind these products. This event goes live on March 18th, 2021. You can learn more here. Flexible Deployment for Project for the web ~ This feature is now available to all users! Create different environments for Project for the web based on organization, business unit, or team needs. Check out our blog post to learn more about this new experience Filter on Project Home ~ Use a search bar to easily find your projects on Project Home. Export Timeline to PDF ~ Print your timeline information to a PDF so you can share your project schedule with external stakeholders. Project Accelerator ~ The Project Accelerator allows users to leverage Power Apps to manage the entire lifecycle of your projects, including demand management, financial goals, team development, and artifact tracking. Assign tasks to non-group members ~ Assign a task to someone without automatically adding them to your project group. Effort in the Project details pane ~ See overall effort on your project directly in the Project details pane, including the total effort, completed effort for your project, and remaining effort on your whole project. This section includes questions we see frequently, either through the in-app Feedback button or from the comments of last month’s blog. Q: What dependencies are supported in Project for the web? A: Project for the web currently only supports Finish-to-Start dependencies. If you need additional dependencies, please submit feedback using our in-app “Feedback” button in the top-right corner of the product. This best helps us keep track of customer needs. Q: Where are attachments stored in Project? A: You can find all your attached files in your Team’s SharePoint library. Note that you can't attach files to tasks in Project unless you have already shared your project to a group. You can do this by using the “Group members” button in the top-right corner of the product. You can attach links to your tasks even before you add a group to your project. We want to hear from you! If you have feedback, submit it by using the “Feedback” button in Project for the web. Make sure to include your email address so we can contact you directly with any follow up questions or comments. Your comments on our blog posts are also monitored, so let us know what you think about this or other articles.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00262.warc.gz
CC-MAIN-2022-33
3,162
21
https://www.mazeless.com/blog/important-http-status-codes-for-seo/
code
HTTPS response status codes are hidden away from a person’s view, handled by a web browser and server, but they provide a wealth of information to developers and SEO teams. If you’re using an HTTP status checker or want to learn more about these codes, we’re going to cover them in great detail. But before we begin, it’s crucial that you understand what these status codes are and why they’re essential. What are HTTP status codes? Whenever you type a URL in your browser or go to a page through a search engine, an HTTP status code is returned. The code is sent from the server to the browser, but you won’t see these codes unless there is some issue with a website or its server. There’s a good chance that you’ve seen a 4XX status code when a page didn’t exist or something that looked like this: Sometimes, the page will be all white with the words: - Page Not Found These codes, 403 and 404 respectively, tell your browser that there’s an issue with the request you’ve sent. What is the status code returned from the server to your browser? Unless it’s your job to check statuses or develop a site, your main concern is that the page loads – period. However, since these responses are a good indicator of what’s happening behind the scenes on your site, it’s important to be able to view the response a page returns. Where can I see the HTTP status code? An HTTP status code checker is the easiest method because it’s a user-friendly way to see the status of a page. However, you can also see the code in your browser in some cases. For example: - Google Chrome: Enter developer mode on a page by pressing Option + ⌘ + J (on macOS), or Shift + CTRL + J(on Windows/Linux) and you’ll see the status of the page and elements that exist. - Firefox: Navigate to Tools > Browser Tools > Web Developer Tools and then click on the Network tab to see the status of a page and its elements. Now that you know where to find these codes, what do they actually mean? It depends. There are a lot of codes to go through. HTTP response status codes Response codes can mean anything, from an HTTP status timeout to the request being successful. Codes are broken down into five main categories: Informational responses (100–199) - 100 Continue: A response that tells the client to continue or ignore the request. - 101 Switching Protocols: A response to an Upgrade header and provides information relating to the protocol the server is switching to. - 103 Early Hints: Used with the Link header. The 103 code allows the preloading of some resources while the response is pending. Successful responses (200–299) Below is the list of all SEO important 2xx status codes: - 200 OK: Indicates that the request was a success. - 201 Created: Commonly sent after a POST or PUT request to indicate that the request was successful and a new resource is being loaded. - 202 Accepted: A response that the request was received, but no action has been taken yet. Typically, this response is given when the server is waiting for another server or process. - 203 Non-authoritative Information: Sent when the metadata doesn’t match the origin server. - 204 No Content: The server has no content to send back. - 205 Reset Content: Reset the document from the request origin. - 206 Partial Content: Sent when the Range header is requesting a partial resource. - 207 Multi-Status: A set of multiple status codes for multiple resource requests. Redirection messages (300–399) - 300 Multiple Choice: Sent when a request has numerous response options. - 301 Moved Permanently: The URL requested has moved, and a new URL is sent. - 302 Found: Indicates that the URL requested has changed temporarily. - 303 See Other: Sent to alert the client to seek the resource at a different URL. - 304 Not Modified: Sent to clients when using cached resources to tell the client that the resource has not been modified since the last cached version. - 307 Temporary Redirect: Follows the same rules as the 302-response code, but the user agent cannot change the HTTP method used. - 308 Multiple Choice: Follows the same rules as a 301-status code, but the HTTP method cannot be changed. Client error responses (400–499) Here is the list of all SEO important 4xx response codes below: - 400 Bad Request: An invalid syntax was sent to the server. - 401 Unauthorized: The client has not authorized itself and must do so to receive a response. - 403 Forbidden: The client does not have access to the file. - 404 Not Found: The resource was not found by the server. - 405 Method Not Allowed: The client sent an unsupported request method for the respective resource. - 406 Not Acceptable: The client sent a request that doesn’t conform to the content in the request. - 407 Proxy Authentication Required: The request must be resent by a proxy. - 408 Request Timeout: The server wants to shut the connection down because it’s unused. - 409 Conflict: The current state of the server is in conflict with the request sent. - 410 Gone: A request for a resource that has been permanently deleted. - 411 Length Required: The Content-Length sent in the header field was not defined and rejected the request. - 412 Precondition Failed: Preconditions in the headers do not meet the server requirements. - 413 Payload Too Large: The requested entity exceeds server limits. - 414 URI Too Long: The client sent a URL request that the server refuses to interpret. - 415 Unsupported Media Type: The client requested a media format that the server doesn’t support. - 416 Range Not Satisfiable: The Range field does not satisfy server requirements. - 417 Exception Failed: The Except header’s data cannot meet server requirements. - 421 Misdirected Request: The server is unable to respond to the request. - 422 Unprocessable Entity: Semantic errors are stopping the request processing. - 423 Locked: The resource requested is locked. - 424 Failed Dependency: A dependency request failed. - 425 Too Early: The server refuses to fulfill the request because it may be repeated. - 426 Upgrade Required: The server may approve the request if an upgrade to the client protocol is made. - 428 Precondition Required: A request failed to meet the preconditions, and the request must be conditional. - 429 Too Many Requests: A response indicating rate limiting due to excessive requests by the user. - 431 Request Header Fields Too Large: The header fields sent by the client are too large to process and must be sent back with smaller header fields. - 451 Unavailable for Legal Reasons: The resource is inaccessible due to legal reasons, such as government censorship. Server error responses (500–599) Below is the list of all 5xx status codes to know for SEO: - 500 Internal Server Error: Server doesn’t know how to handle the client request. - 501 Not Implemented: The server does not support the request. - 502 Bad Gateway: An invalid response was sent to the server. - 503 Service Unavailable: The server cannot handle the request. - 504 Gateway Timeout: The server cannot receive a response fast enough when acting as a getaway. - 505 HTTP Version Not Supported: The server does not support the HTML version requested. - 506 Variant Also Negotiates: An internal configuration issue exists. - 507 Insufficient Storage: The server cannot store and fulfill the request. - 508 Loop Detected: Infinite loop is stopping the request from being successful. - 510 Not Extended: Extensions to the original request are required to fulfill the request. - 511 Network Authentication Required: The client must be authenticated to gain network access. Why HTTP Status Codes and Errors Matter for Search Engine Optimization (SEO) Google’s John Mueller has a lot of interesting advice (view below) where he discusses 404 errors specifically. Mueller states that if a site has 30% or 40% 404 errors, it’s totally fine. He mentions churn sites, such as classified ads, specifically. However, while acceptable, this is truly dependent on the site and what value these pages offer. For example, if you have removed pages that are of no SEO value, Google will not penalize you, according to what Mueller said in the video. That’s a good thing. With that said, let’s assume that you just migrated your site and now 20% of the pages are showing 404 errors. You’ll lose SEO value in the process. After a migration, you should check page status for all pages and work to restore pages that you want to keep on your site for SEO value or redirect them to corresponding pages. Running a mass HTTP status checker on your site periodically is good practice and can help you correct any issues that naturally pop up during a site’s evolution. The main issues that we see pop up with errors are: - 4xx codes – Issues with pages disappearing exist because they’ll be deindexed by Google, so you lose SEO value and traffic. - 301 and 302s – 3xx redirects aren’t bad, but it’s too easy to have a 301 redirect in place of a 302 or vice versa. - 5xx status – The 5xx ranges are present with server errors and issues, such as an HTTP status code timeout, although some 4xx responses can also be timeout issues. Thankfully, you don’t have to worry about a 1XX or 2XX response impacting your site’s SEO. A status code checker helps you identify issues as they arise and make changes quickly to improve usability and rankings in some cases. You have a lot of options for monitoring and checking page status. Monitoring HTTP Status Code Responses What is the status code returned from the server to your browser? Unless an error is sent to your browser and displayed on the screen, you won’t know what code is sent to you. Instead, you should use an HTTP status code checker to monitor response codes. You can sift through your site’s log files to search for a specific 4XX status code or 5XX status code, but it’s incredibly time-consuming. If your site is an enterprise, a status code checker is the only feasible way to monitor status codes. Thankfully, monitoring status codes is possible with the right tools, such as: Screaming Frog has a built-in crawler that will find broken links and server errors on your site. Running this HTTP status checker periodically and then exporting the list of errors is one way to monitor your site’s status. Google Search Console Google’s Search Console is something that you should use to find errors on your site. When you navigate to the “Coverage” tab, you’ll find pages where Google found issues on your site. While this isn’t the best URL status checker, it gives you a quick glimpse at what problems the search giant has when crawling your site. We might be a little biased, but our HTTPS status checker is what we recommend you use for tracking your status codes. Our checker is part of our larger tool, but it provides a fast and easy way to monitor HTTP status timeout, 1XX status code, 2XX status code, 3XX status code, 3xx redirection and of course, 4XX and 5XX codes, too. Certain browsers accept only some HTTP Response Status Codes. Here is a list of browsers and the codes they accept: 1XX Status Codes and Browser Compatibility 2XX Status Codes and Browser Compatibility 3XX Status Codes and Browser Compatibility 4XX Status Codes and Browser Compatibility 5XX Status Codes and Browser Compatibility The Internet protocols that allow HTTP requests to work include: - Application Layer Protocols: The application layer deals with process-to-process communication and consists of numerous protocols, including but not limited to: HTTP/S, FTP, POP, DNS, XMPP, SSH and more. - Transport Layer Protocols: The transport layer is used for connection-oriented transmissions and includes TCP, SCTP, UDP and others. - Internet Layer Protocols: The Internet layer is a series of methods, protocols and specifications used to send network packets across the Internet. IPv6 and IPv6 are two core protocols used in the Internet layer. - Link Layer Protocols: The lowest layer in the Internet protocol is the link layer. This layer “talks to” physical and logical network components using tunnels, NDP, PPP, MAC or other protocols. HTTP response status codes indicate the health of your server, help you find issues with pages, folders or files on your site and allow you to correct them. Once you understand the codes and have an HTTP status checker in place, you’ll be better prepared to fix issues with your site that can lead to: - Lost organic traffic - Poor usability - Drop in revenue Identifying and correcting issues is vital to the success of any website.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00130.warc.gz
CC-MAIN-2023-50
12,601
118
https://datacolorado.com/publication/erl-15/
code
This study combines address-level residential photovoltaic (PV) adoption trends in California with several types of geospatial information-population demographics, housing characteristics, foreclosure rates, solar irradiance, vehicle ownership preferences, and others-to identify which subsets of geospatial information are the best predictors of historical PV adoption. Number of rooms, heating source and house age were key variables that had not been previously explored in the literature, but are consistent with the expected profile of a PV adopter. The strong relationship provided by foreclosure indicators and mortgage status have less of an intuitive connection to PV adoption, but may be highly correlated with characteristics inherent in PV adopters. Next, we explore how these predictive factors and model performance varies between different Investor Owned Utility (IOU) regions in California, and at different spatial scales. Results suggest that models trained with small subsets of geospatial information (five to eight variables) may provide similar explanatory power as models using hundreds of geospatial variables. Further, the predictive performance of models generally decreases at higher resolution, i.e., below ZIP code level since several geospatial variables with coarse native resolution become less useful for representing high resolution variations in PV adoption trends. However, for California we find that model performance improves if parameters are trained at the regional IOU level rather than the state-wide level. We also find that models trained within one IOU region are generally representative for other IOU regions in CA, suggesting that a model trained with data from one state may be applicable in another state.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00417.warc.gz
CC-MAIN-2024-18
1,756
1
https://www.florins.co/what-specific-free-documents-can-entrepreneurs-use-for-seed-funding/
code
My startup is in the process of raising seed funding 100k+. When I receive the term sheet, is there any document that I can review to avoid making mistakes? What are some of the safety measures I should take? There are several sets of ‘standard’ documents which you can consider using or at least reviewing and using as a comparison to a term sheet you get. 1) Y Combinator Series AA: http://ycombinator.com/seriesaa…. Yokum Taku does a great job at comparing them and explaining pros and cons of using these vs. using a lawyer: http://www.startupcompanylawyer…. The cool thing about these 3 sources is that they are a set of documents, i.e. they can take you from term sheet and all the way through to closing the investment round. For a bit more complex and later stage docs you can see: There was quite a debate back in Q2 2009 around this topic and you’ll be able to find lots of views from then. Reading these articles helps get a really good understanding of the contents of the docs and you can then form your own view on how you take your funding documentation process forward. Innovator & CEO Everything In Life Is Touched by Digital Magic. I brought Digital Magic Into The World Through 29 Products I’ve Built and Sold World-Wide
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00247.warc.gz
CC-MAIN-2024-10
1,251
6
https://malwaretech.com/2015/08/user-mode-hook-scanner-alpha.html
code
User Mode Hook Scanner (Alpha) I finally decided to write my first security tool based on an idea I had for advanced hook detection, I couldn’t find any evidence of the method being used so I based a tool around it. It’s still a working progress but I’m posting so I can get some feedback early on (Currently only x86 systems are supported, but this shouldn’t be an issue as most researchers are running 32-bit VMs). ## Advanced Scanning The scanner will iterate the export table for the following system modules: ntdll.dll, kernel32.dll, kernelbase.dll, user32.dll, ws2_32.dll, and wininet.dll. Like a conventional scanner it will go through each instruction of the exported function, comparing it against a clean version of the dll which has been loaded from the disk. Normally at this point a hook scanner would either report the modification or check to see if it’s a jump or call, but I’ve decided to take an extra step towards detecting obscure hooks. Function Emulation If any modification is found at any point within the function body, the scanner will use my basic x86 emulator to begin emulating the function, while tracing push, pop, mov, lea, jmp, call, and ret instructions. The emulator will try to determine if control flow is altered by the modified instructions and if so, which instruction redirects execution and to where. The purpose of the emulator is to detect more obscure hooks as well as accurately determine the destination of the hook, beyond resolving basic jump and call instructions. A good example of where this is applicable is on hooks placed by carberp within the native call stubs of ntdll. Consider this example call stub:> mov eax, 0xAA mov edx, 0x7FFE0300 call dword ptr [edx] This function does not use a relative call, instead it moves a pointer into the edx register and performs an absolute indirect call with it. Carberp replaces the address moved into the edx register, resulting in redirecting the call to an arbitrary location, and not showing up in hook scanners searching for jmp/call hooks. More advanced hook scanners will log any modifications; however, the user would then have to disassemble the modified function and determine the destination address of the hook, which my engine does automatically (if it fails to resolve the location or detect a control transfer, the modification will still be logged for further investigation). Most rootkits hook by injecting their code (usually shellcode or a PE file) into the target process, hooks are then set to point to locations within the injected code. If the tool is successfully able to work out the destination of a hook, it will query the page it points to and then map out all pages allocated with the same base address. Using this information it is possible to dump the rootkit’s entire shellcode, injected PE or DLL, even if it spans multiple pages. Again, this is a working progress and I can’t guarantee the current version won’t be a huge steaming pile of crap. please email any feedback/issues to [email protected] or leave a comment on this post.Here’s a demo video to prove it does at least work on my system: Download Link: https://www.malwaretech.net/downloads/HookScanner.rar
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00825.warc.gz
CC-MAIN-2023-50
3,213
12
http://www.webmasterworld.com/printerfriendlyv5.cgi?forum=151&discussion=4595084&serial=4595597&user=
code
numnum - 5:06 am on Jul 23, 2013 (gmt 0) As far as search engines are concerned, there's very little difference between having Right, that is the issue -- whether there's an SEO advantage per se in using one vs three blogs. My hunch is that the answer is no. So which to use depends on which users will find more useful. In my case, I think three distinct blogs is better, mainly because the three topics are mutually exclusive (even though they are related). It would make little sense to require any user to scroll past two irrelevant posts or check an RSS feed twice unnecessarily to get to a third, relevant one. Also, contextual ads would probably be more relevant in the case of three separate blogs, at least in theory. Right? Finally, the names of the blogs themselves would be more specific and hence more likely to attract the right audience. Fewer bounces off the site.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010749774/warc/CC-MAIN-20140305091229-00080-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
880
6
https://docs.snyk.io/scan-with-snyk/snyk-iac/build-your-own-iac-custom-rules/iac+-and-cloud-custom-rules
code
Prerequisites for IaC to cloud custom roles Install the following in your PATH: Snyk CLI >= 1.1168.0 For details, see Install or update the Snyk CLI. Configure the CLI appropriately and set your default Organization: snyk config set org=<org id> If you work with multiple Snyk Organizations, you can add --org=<your org id> to your commands to specify your desired Organization. Predefined security rules in Snyk IaC Snyk IaC includes a set of security rules that work out of the box, covering AWS, Azure, GCP, and Kubernetes. These rules are based on security research, best practices, recognized standards, and benchmarks. New rules are released regularly. Snyk’s security engineering team actively maintains them. These rules are intended to meet most of your needs on your first scan, but you may need to enforce additional security rules for your system, such as tagging standards. Purpose of Cloud Custom Rules Complementing Snyk’s predefined rules, IaC to Cloud Custom Rules enables you to enforce your internal security controls across your SDLC (software development lifecycle). Using Cloud Custom Rules, you can identify and highlight the following: Issues on cloud configurations across the SDLC, including SCM, CLI, Terraform Cloud, and deployed cloud environments Issues on any Terraform IaC configurations using Terraform providers beyond cloud (AWS, Azure, Google Cloud) configurations, such as GitHub or Snowflake configurations. The following are the steps in using Cloud Custom Rules:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00170.warc.gz
CC-MAIN-2024-18
1,506
14
https://flashmount.net/best-hosting-for-author-website/
code
Best Hosting For Author Website Discovering a high-grade affordable web hosting provider isn’t easy. Every site will certainly have various needs from a host. Plus, you need to contrast all the functions of a hosting business, all while trying to find the best deal possible. This can be a lot to kind through, particularly if this is your first time buying organizing, or building a web site. The majority of hosts will offer extremely cheap introductory prices, only to elevate those prices 2 or 3 times greater once your preliminary call is up. Some hosts will supply free bonuses when you register, such as a totally free domain, or a totally free SSL certification. While some hosts will certainly be able to supply far better efficiency and also high degrees of safety. Best Hosting For Author Website Below we dive deep into the very best low-cost webhosting plan there. You’ll discover what core holding attributes are necessary in a host and also just how to assess your very own organizing requirements to make sure that you can choose from one of the very best economical organizing providers listed below. Disclosure: When you buy a web hosting package through web links on this page, we gain some payment. This helps us to maintain this website running. There are no additional prices to you in any way by using our web links. The listed here is of the most effective affordable web hosting bundles that I’ve personally utilized and checked. What We Take into consideration To Be Economical Web Hosting When we explain a web hosting plan as being “Inexpensive” or “Spending plan” what we indicate is hosting that falls under the price brace between $0.80 to $4 each month. Whilst looking into cheap holding service providers for this guide, we checked out over 100 different hosts that came under that cost array. We after that evaluated the top quality of their most inexpensive holding package, value for cash as well as customer service. In this short article, I’ll be reviewing this first-rate site holding company as well as stick in as much relevant information as possible. I’ll go over the functions, the rates choices, and anything else I can think of that I assume may be of advantage, if you’re making a decision to join to Bluhost and also obtain your sites up and running. So without more trouble, allow’s check it out. Bluehost is one of the biggest web hosting business on the planet, getting both huge advertising and marketing support from the firm itself as well as associate marketing professionals that promote it. It really is an enormous business, that has actually been around for a very long time, has a large reputation, as well as is certainly one of the top choices when it involves webhosting (definitely within the leading 3, at least in my book). But what is it specifically, and also should you obtain its services? Today, I will certainly respond to all there is you require to understand, offered that you are a blog writer or a business owner that is searching for a host, as well as does not understand where to get going, given that it’s a terrific service for that target market generally. Let’s picture, you want to host your sites as well as make them noticeable. Okay? You already have your domain name (which is your site location or LINK) today you wish to “turn the lights on”. Best Hosting For Author Website You need some holding… To accomplish every one of this, and also to make your site visible, you require what is called a “server”. A server is a black box, or gadget, that stores all your internet site information (data such as photos, messages, video clips, links, plugins, and also various other details). Now, this web server, has to get on constantly and also it has to be attached to the net 100% of the time (I’ll be discussing something called “downtime” in the future). On top of that, it also needs (without getting too fancy as well as right into information) a file transfer protocol typically referred to as FTP, so it can reveal internet browsers your internet site in its designated form. All these points are either costly, or require a high degree of technical ability (or both), to develop as well as preserve. And also you can completely go out there as well as discover these points by yourself and set them up … however what concerning as opposed to you buying as well as preserving one … why not simply “renting out organizing” rather? This is where Bluehost is available in. You rent their web servers (called Shared Hosting) and you launch an internet site utilizing those web servers. Because Bluehost maintains all your files, the firm also permits you to set up your web content administration systems (CMS, for brief) such as WordPress for you. WordPress is an extremely prominent CMS … so it simply makes good sense to have that option readily available (practically every hosting firm currently has this choice as well). Simply put, you no more need to set-up a web server and afterwards incorporate a software program where you can construct your web content, separately. It is already rolled right into one plan. Well … imagine if your web server remains in your residence. If anything were to take place to it in any way, all your files are gone. If something goes wrong with its internal processes, you require a specialist to fix it. If something overheats, or breaks down or obtains damaged … that’s no good! Bluehost takes all these hassles away, as well as deals with everything technological: Pay your server “rental fee”, and they will care for whatever. And once you acquire the service, you can then begin focusing on including web content to your internet site, or you can put your initiative right into your advertising projects. What Solutions Do You Get From Bluehost? Bluehost uses a myriad of different services, but the key one is hosting naturally. The hosting itself, is of various types by the way. You can lease a shared server, have a committed web server, or additionally an onlineprivate server. For the objective of this Bluehost evaluation, we will certainly focus on organizing services and various other solutions, that a blogger or an on the internet business owner would certainly need, as opposed to go unfathomable into the rabbit opening as well as talk about the other services, that are targeted at even more experienced folks. - WordPress, WordPress PRO, as well as e-Commerce— these organizing solutions are the bundles that permit you to hold a website using WordPress and WooCommerce (the latter of which enables you to do e-commerce). After purchasing any one of these packages, you can begin building your web site with WordPress as your CMS. - Domain Industry— you can additionally purchase your domain name from Bluehost instead of various other domain name registrars. Doing so will make it simpler to aim your domain to your host’s name servers, considering that you’re using the very same market. - Email— when you have purchased your domain, it makes good sense to additionally get an email address tied to it. As a blogger or on the internet entrepreneur, you should basically never ever utilize a totally free email solution, like Yahoo! or Gmail. An e-mail such as this makes you look less than professional. Luckily, Bluehost offers you one free of cost with your domain. Bluehost additionally supplies committed servers. And you may be asking …” What is a dedicated server anyway?”. Well, the important things is, the fundamental host packages of Bluehost can only so much web traffic for your website, after which you’ll need to upgrade your hosting. The reason being is that the typical servers, are shared. What this indicates is that a person web server can be servicing two or more web sites, at the same time, among which can be your own. What does this mean for you? It indicates that the single web server’s resources are shared, and also it is doing numerous tasks at any type of given time. As soon as your internet site begins to strike 100,000 site sees every month, you are going to need a committed web server which you can also get from Bluehost for a minimum of $79.99 per month. This is not something yous must worry about when you’re starting but you should keep it in mind for sure. Bluehost Rates: How Much Does It Price? In this Bluehost evaluation, I’ll be concentrating my focus mostly on the Bluehost WordPress Hosting packages, since it’s one of the most prominent one, and also likely the one that you’re looking for and that will certainly suit you the best (unless you’re a significant brand, business or site). The three readily available plans, are as follows: - Fundamental Strategy– $2.95 per month/ $7.99 regular cost - Plus Strategy– $5.45 per month/ $10.99 routine cost - Selection And Also Plan– $5.45 per month/ $14.99 normal rate The first cost you see is the cost you pay upon subscribe, as well as the second price is what the cost is, after the initial year of being with the business. So essentially, Bluehost is going to bill you on an annual basis. And you can also choose the quantity of years you wish to organize your site on them with. Best Hosting For Author Website If you pick the Standard plan, you will certainly pay $2.95 x 12 = $35.40 starting today as well as by the time you enter your 13th month, you will certainly currently pay $7.99 per month, which is likewise billed each year. If that makes any kind of feeling. If you are serious about your internet site, you must 100% get the three-year alternative. This means that for the standard plan, you will pay $2.95 x 36 months = $106.2. By the time you strike your fourth year, that is the only time you will pay $7.99 monthly. If you consider it, this method will save you $120 during 3 years. It’s very little, yet it’s still something. If you want to obtain greater than one internet site (which I highly advise, and also if you’re major, you’ll possibly be getting even more at some point in time) you’ll want to make use of the selection plus strategy. It’ll permit you to host unrestricted web sites. What Does Each Strategy Deal? So, in the case of WordPress organizing strategies (which resemble the shared holding strategies, but are much more tailored towards WordPress, which is what we’ll be concentrating on) the features are as follows: For the Standard strategy, you get: - One website only - Protected website through SSL certification - Optimum of 50GB of storage space - Cost-free domain for a year - $ 200 advertising credit score Keep in mind that the domain names are bought separately from the holding. You can obtain a cost-free domain with Bluehost here. For both the Bluehost Plus hosting and Choice Plus, you get the following: - Unrestricted variety of websites - Free SSL Certificate. Best Hosting For Author Website - No storage or bandwidth limitation - Cost-free domain name for one year - $ 200 advertising credit rating - 1 Office 365 Mailbox that is complimentary for 1 month The Choice Plus strategy has actually an added benefit of Code Guard Basic Back-up, a back-up system where your data is conserved and replicated. If any kind of crash occurs as well as your site data vanishes, you can recover it to its initial kind with this attribute. Notice that even though both strategies cost the very same, the Choice Strategy after that defaults to $14.99 per month, routine price, after the collection amount of years you have actually selected. What Are The Conveniences Of Using Bluehost So, why pick Bluehost over various other host services? There are thousands of webhosting, many of which are resellers, yet Bluehost is one select couple of that have actually stood the test of time, and also it’s possibly one of the most well known out there (and permanently reasons). Below are the 3 main advantages of selecting Bluehost as your web hosting provider: - Server uptime— your web site will not show up if your host is down; Bluehost has more than 99% uptime. This is very essential when it comes to Google Search Engine Optimization as well as positions. The greater the much better. - Bluehost rate— how your web server feedback establishes just how rapid your internet site shows on a web browser; Bluehost is lighting quick, which indicates you will certainly minimize your bounce price. Albeit not the best when it pertains to packing rate it’s still widely vital to have a fast rate, to make individual experience far better as well as much better your ranking. - Limitless storage space— if you get the Plus strategy, you need not bother with how many documents you save such as videos– your storage space ability is unrestricted. This is actually essential, since you’ll probably run into some storage problems later down the tracks, and also you don’t desire this to be a headache … ever before. Finally, customer support is 24/7, which indicates regardless of where you remain in the globe, you can get in touch with the support group to repair your internet site problems. Pretty conventional nowadays, however we’re taking this for given … it’s additionally extremely important. Best Hosting For Author Website Also, if you have actually obtained a free domain with them, then there will certainly be a $15.99 charge that will certainly be subtracted from the amount you originally acquired (I visualize this is due to the fact that it type of takes the “domain out of the marketplace”, not exactly sure about this, yet there most likely is a hard-cost for registering it). Finally, any requests after one month for a refund … are void (although in all honesty … they ought to probably be stringent here). So as you see, this isn’t always a “no doubt asked” policy, like with some of the various other organizing options out there, so make sure you’re all right with the policies before continuing with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053759.24/warc/CC-MAIN-20210916204111-20210916234111-00237.warc.gz
CC-MAIN-2021-39
13,979
82
https://codeproject.freetls.fastly.net/Messages/5097003/Re-The-above-post-is-incorrect-SQL-Linq-Date-Range
code
|Hover your mouse pointer over a message and two arrows should appear on the left side. The green upward pointing one is an upvote. The old voting system was removed due to abuse, but now a spam/abuse vote is used as a one vote by wuck fits and trolls. No real change there. What do you get when you cross a joke with a rhetorical question? The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism. Do questions with multiple question marks annoy you???
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00290.warc.gz
CC-MAIN-2024-10
519
4
https://forum.singaporeexpats.com/viewtopic.php?t=87116&start=15
code
Hi confused lady and leejet, May i know the update regarding your situation? I have the same case.. With IPA but was refused entry few days ago.. Now i need to go back to sg but not sure whether i could pass by the immigration.. My ipa doesnt include single journey visa because in the first place, im not required to have a visa.. What should i do? Ive seen a lot of posts that writing to ICA doesnt help at all.. Pls email me @ [email protected] Really appreciate your assistance! Thanks what passport do you hold ? IPA has no bearing on your arrival as tourist, unless you been doing visa runs. what did you do before to earn the wrath of ICA ? Do form 13A, to get a visa.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00608.warc.gz
CC-MAIN-2024-18
675
7
https://amypountney.wordpress.com/2015/02/24/meet-the-team-task/
code
This week me and Connor arranged to meet up in one of the computer labs in university and create our meet the team page. This was the process we went through. This is what is on the page, with mine and Connor’s description and our photo, unfortunately our other team mate did not make our team meeting. This is the CSS element to our meet the team page, with all the styles and arrangement of where everything is meant to go. As you can see on the right of both of these screenshots is my Dakar server. Through the process of creating this page, it was useful to keep saving the files and uploading them on to my public folder on my dakar account to see any edit I had made to the code and seeing what effect is actually had on the webpage, as for me I understand it better if I edit to code then upload it on the server so I can actually visually see the changes. Also being fairly new to HTML and CSS I feel like I need to check what I have done is correct and more importantly what I wanted it to do. Once I have seen it I can then decide if it needs to be edited further or not. This was our final design for our Meet the team page. This is the majority of the code for the meet the team page. Im glad this got completed, as it was set as a starter task so we can now carry on to work on our web application and design the whole code ourselves.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589573.27/warc/CC-MAIN-20180717051134-20180717071134-00349.warc.gz
CC-MAIN-2018-30
1,350
5
https://community.openfl.org/t/openfl-starling-html5-dynamic-project-size/13652
code
I need your help with my project once more) Is it possible to set stage size in real time from js code? Now I set it in project.xml <window width="960" height="640"> And in starling: var starling = new Starling(Game, stage, null, null, Context3DRenderMode.AUTO, "auto"); starling.stage.stageWidth = 960; starling.stage.stageHeight = 640; private function onResize(e:openfl.events.Event):Void var viewPort:Rectangle = RectangleUtil.fit(new Rectangle(0, 0, 960, 640), new Rectangle(0, 0, stage.stageWidth, stage.stageHeight)); starling.viewPort = viewPort; } catch (error:Error) If I change html canvas width or height I get white areas: and no Resize events Using the default html5 template, which fills the entire page, if the user resizes the browser window, this correctly resizes the stage, and Event.RESIZE is dispatched. So OpenFL definitely supports being resized dynamically after it has started. Instead of resizing the Canvas, you might try resizing the <div> element that the Canvas is added to. In the default html5 template, it’s defined like this: So you should be able to find it with something like document.getElementById("openfl-content") (if you’re using a custom template, it might have a different ID). Then, you can try resizing the <div> with something like div.style.width = "100px", and (hopefully) OpenFL can detect the change. I change div height: But still don’t recieve RESIZE event to redraw my game to cover black areas. I want to change stageWidth|stageHeight and update starling viewPort As I see it just keeping right proportion I ask other way. I have universal graphics for my game wirt aspect ratio from 4:3 to 5:2. Game GUI is flexible. Game content is always centered - and black sides are appear for other aspect ratio. Example for AIR Windows version: So I need the same for OpenFL project. But I even can’t recieve stage RESIZE event to implement it. Is it possible? Can your game fill the entire browser window? Or must it be a smaller region within the page? Because the default settings for the html5 target are the fill the entire window, and the stage will automatically resize when the user resizes the window. So you should be able to use the exact same aspect ratio logic as in AIR. However, when you set the window’s width/height in your project.xml, it forces the stage size to be a specific size with no resizing: <window width="960" height="640"/> <!-- remove this --> So to go back to the default behavior, just remove the part where you set the Or, if you need to support other targets, you could do this instead: <window width="960" height="640" unless="html5"/> @joshtynjala Very thanks! Handy advice! It help me to solve some other things with graphics quality! I wish there was a cookbook with trikcs like that with examples! Yes, if you set width and height in project.xml you won’t receive any onResize event. I am not sure if it applies to starling. But stageScaleMode is something related to this:
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500664.85/warc/CC-MAIN-20230207233330-20230208023330-00319.warc.gz
CC-MAIN-2023-06
2,972
42
http://fredandrandall.com/blog/2011/10/15/how-to-change-the-color-of-uibarbuttonitem-on-ios-5/
code
My most popular blog post is how to change the color of a UIBarButtonItem. It’s something that lots of people want to do, but it involved some pretty weird hacks to get it working. Now that iOS 5 is out, I can talk about a better way to do it. Apple will now let you set the tintColor: property on the bar button item. That’s it. No more weird hacks with images or segmented controls. There’s even a cool new appearance proxy that will let you change all controls from your app with a single line of code. (More about UIAppearance here) So lets say you want every UIBarButtonItem in your application to be blue. That’s easy just call [UIBarButtonItem appearance] setTintColor:[UIColor blueColor]] Remember, this is iOS 5 only. If you want your app to support iOS 4, you’ll have to do it the old way. Pingback: How to change the color of a UIBarButtonItem | farp.blog If you want the blue to be exactly the same at the “done” button you gotta do the following: I spent about 15 mins with my DigitalColor Meter and basically guessed and checked until I finally got it. The problem is that you’re adding a “tint” to a black button to make it blue, so it won’t be the right blue. Here’s the correct measurements: [buttonName setTintColor:[UIColor colorWithRed:34.0/255.0 green:97.0/255.0 blue:221.0/255.0 alpha:1]]; Hope it helps someone
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00145.warc.gz
CC-MAIN-2023-23
1,357
12
https://datavizforall.org/
code
Fall 2023 Syllabus Our course meets in-person on Mondays and Wednesdays 11:30am-12:45pm in Library B02 at Trinity College, Hartford. You are welcome to wear a mask at any time on campus, and I may require all students to wear masks in class if Covid rates rise significantly. Teaching Assistant Mia Rodriguez - contact and scheduling info on Moodle Course description: How can charts and maps tell meaningful stories? How can they mislead us from the truth? In this introductory hands-on course, we will create data visualizations in order to better understand design principles and develop a critical analysis of the field. Students will learn skills in both quantitative reasoning and digital storytelling as we advance from beginner tools to editing code templates. For the community learning component, our class will build interactive charts and maps on a public policy issue with a Hartford-area partner organization. No coding experience is necessary, but curiosity is required. - Fulfills Numerical and Symbolic Reasoning (NUM) requirement. - Cross-referenced with Community Learning, Public Policy & Law, Writing & Rhetoric, Urban Studies. - Enrollment limited to 19 students. Community Learning Projects This semester we will work with Hartford-area community learning parters on two data visualization projects: Child Care and College Access. Child Care: Izzi Greenberg, Executive Director of Middlesex Coalition for Children and Merrill Gay, Executive Director of CT Early Childhood Alliance have asked us to help visualize answers to this broad question: How and why does child care availability, affordability, and quality vary across Connecticut, and what can we learn from improvement strategies outside the state? College Access: Melissa Paul, Director of College Partnerships + Reaching Forward at Hartford Promise, has asked us to help visualize answers to this broad question about “successful matches” for their scholarship program: What measurable factors might explain why comparable groups of Hartford Promise scholars tend to experience success in college, relative to other students at these institutions? Course Materials and Tools - Two open-access books are freely available online (or you can purchase print editions). - Bring a laptop computer (Mac, Windows, or Chromebook) to every class. Install more than one browser (such as Firefox, Safari, Chrome) for testing purposes. Tell me if you need a temporary laptop loaner. - You will need to sign up for several free web services (such as Google Drive, Datawrapper, GitHub). See my list of recommended free digital tools in this course. Learning Goals and Assessments In this course you will demonstrate the knowledge and skills you have developed to meet 12 broad learning goals (with more specific sub-goals listed in the schedule further below): - Strengthen Your Spreadsheet Skills - Find and Question Your Data - Clean Up Messy Data - Make Meaningful Comparisons - Chart Your Data - Map Your Data - Transform Your Map Data - Edit and Host Leaflet Code on GitHub - Explore Leaflet Map Code Templates - Embed on the Web - Tell and Show Your Data Story - Detect Lies and Reduce Bias Your progress toward these learning goals will be assessed in three ways: A. Open-Book Weekly Quizzes - The purpose is to demonstrate your knowledge and skills through questions that emphasize conceptual understanding and how to apply it in new contexts. You will have more than one opportunity to successfully complete each quiz while working independently with your notes, readings, and any web resources. - Each week, select any 2-hour period during the quiz window (typically a four-day window from Wednesday afternoon to Sunday 9pm) to complete a Moodle quiz of around 5 questions on the designated learning goal. You may see different versions of questions than other students, but all questions address the same goal. - Students can make at least two quiz attempts during the typical four-day window. Short-answer questions will be scored automatically by the computer, and show-your-work questions will be scored manually by the instructor. If you respond incorrectly to an auto-scored question, the quiz will offer advice and allow you to try again. If you respond incorrectly to a manually-scored question, the instructor will offer advice via email or a meeting and allow you to try again before the quiz window closes, if sufficient time remains. - HINT: Start your quiz by Friday 1pm if you want to receive the instructor’s feedback on show-your-work questions before the quiz window typically closes on Sunday 9pm. If you wait until the last minute and don’t start your quiz until Saturday or Sunday, you may not receive feedback from the instructor in time. - Before you start the quiz, prepare by reading assigned chapters, doing practice exercises, and discussing the material with classmates who have not yet started it. - When you start the typical 2-hour quiz period, you may use your materials (including your notes, the online book, and any content on the Internet), but you must work independently and you may not communicate about the quiz content in any way (except with the instructors) until the quiz has closed. See the Intellectual Honesty policy further below. - If you do not begin a quiz or demonstrate sufficient effort during the quiz window, a 20 percent late penalty will be deducted for every 12-hour period beyond the deadline. Exceptions are granted only for documented health or family emergencies. - 12 broad learning goals x 5 points per quiz = 60 points B. Building Data Stories - The purpose is to show your original work in building different stages of data visualizations and written narratives that explain why and how it matters to our community partners. See the Intellectual Honesty policy below. - Depending on the stage of the build, your work will be evaluated by the instructor, your peers, or guest experts, based on a rubric. - 7 stages x 5 points = 35 points. A 20 percent late penalty will be deducted for every 12-hour period beyond the deadline. Exceptions are granted only for documented health or family emergencies. C. Class Participation - The purpose is to encourage active learning and accountability. Each student begins the course with 5 participation points. During class, you may be randomly called on to discuss a concept in our reading, or to share your computer screen for everyone to view while we learn tools and build data stories. You do not necessarily need to know the correct answer. But if you are not present or not able to participate when called, a point will be deducted from your participation score. - Exceptions may be granted for health or family emergencies, if you email me prior to class. If you are quarantined or isolated due to Covid, or have other concerns about your health, email me well in advance to request permission to participate remotely via Zoom during a specific class session. Last-minute requests may not be granted. - Exceptions are also granted for any scheduling conflicts (such as religious observances or other pre-planned events) where you have notified me well in advance. Last-minute requests may not be granted. 60 points quizzes + 35 points data stories + 5 class participation = 100 total points. In this course, unsatisfactory work (below 70%) falls in the D or F range, adequate work (70-79%) in the C range, good work (80-89%) in the B range, and outstanding work (90 to 100%) in the A range. Each range is divided into equal thirds for minus (-), regular, and plus (+) letter grades. For example, 80 to 83.33% = B-, 83.34 to 86.67 = B, and 86.68 to 89.99 = B+. Access your individual assessments on the password-protected Moodle site for this course at https://moodle.trincoll.edu. - You are responsible for following the Intellectual Honesty policy as described in the Trinity Student Handbook. - For online quizzes, you may use your materials (including your notes, the online book, and any content on the Internet), but you must work independently and you may not communicate about the quiz content in any way (except with the instructors) until the quiz has closed. If doubts arise, the instructor may require you to retake a quiz under direct supervision and/or refer a case to the Honor Council. - For build assignments, You (and your partner) are expected to create all original content (text and visualizations), with proper citations to any paraphrased or quoted text written by others, and image credits to any visuals produced by others. If any doubts arise, the instructor may require ask you to independently reproduce content under direct supervision and/or refer a case to the Honor Council. Please notify me before our third class session, and schedule an appointment on my calendar to discuss how we will implement your approved plan. For those students with accommodations approved after the start of the semester, a minimum of 10 days’ notice is required. Learn more at the Student Accessibility Resource Center. How to Succeed in this Course - Bookmark this online syllabus and check it for important updates, which will appear in bold. - Keep a calendar (paper or digital) to manage your time and meet deadlines. - Bring a laptop (with a fully-charged battery) to every class, and turn off distractions to help you (and others) focus on learning. Set notifications on digital devices to “Do Not Disturb.” - Use a password manager to keep track of your digital accounts. See my introduction to Bitwarden, an open-source password manager with free core features for Windows/Mac/Linux computers, all major web browsers, and iOS and Android mobile devices. - Take initiative and ask questions: during or after class, via email, or by appointment on my calendar. If you don’t understand something, other students probably are puzzled, too. Go ahead and ask. - Meet up with other students outside of class. Create a small study group to review the course material and work together. The secret to success in college is teaching yourselves how to learn new material. - If anything is interfering with your learning, email or talk with me. I care about how you’re doing in life, not just in our classroom. - Important updates from the instructor will be marked in bold. Wed Sept 6 - Bring a laptop computer (or use a desktop in the classroom). - If you are enrolled but do not attend our first class, the Registrar will be instructed to drop you from the roster. - Foldable name cards: write your preferred first name on both sides, and on the inside, add a unique detail about yourself to help me remember your name. I will collect them at the end of each class. - Overview of the syllabus, Hartford community-learning partners, and past projects - Advice from TA on scheduling appointments and how to succeed in this course - Sample quiz about syllabus for 1-point bonus, with open-note format, due in class on Moodle - Fill out simple form to share the Google Drive username (aka Gmail address) that you will use for this course - Read: Feedback from prior students about this course in Spring 2023 - Presentation: Why data visualization matters in the “disinformation age”. See Hands-On DataViz (HODV), Chapter 1 https://handsondataviz.org/introduction.html - In-class: What sparks your interest in this course? Anonymous free-write on shared Google Doc - Presentation: Why data visualization matters to me: Telling and showing hidden stories of housing and education inequality in On The Line book-in-progress - Strengthen your spreadsheet skills: Starting reading and working on sample exercises before our next class listed below. Mon Sept 11 - Before class, fill out quick survey about prior experience and education, then view 3000+ results in public sample dataset - Overview of Learning Goal #1: Strengthen Your Spreadsheet Skills, HODV Chapter 2 https://handsondataviz.org/spreadsheet.html - Spreadsheet terms, tools, and data formats - Download, Copy, Share, and Convert Google Sheets - Geocode locations - Sort and filter data - Calculate with formulas - Summarize with pivot tables - Match columns with VLOOKUP - In-class: Google Spreadsheet Skills Practice - In-class: Google Sheet Sharing Practice - Prep for Spreadsheet quiz, to be taken during any 2-hour period before Sun Sept 17th 9pm on Moodle. HINT: Start your quiz by Fri 1pm to ensure sufficient time for instructor feedback. - During the quiz window, some students may receive an email from the instructor with instructions to redo or revise. If no email arrives, you may have earned full credit, which can be confirmed in your Moodle gradebook. Wed Sept 13 - Before class, read background information on our partners’ websites and be prepared to ask questions about their data requests: - In-class: Meet with community-learning partners on Zoom - 11:45-12pm College Access questions with Melissa Paul (Hartford Promise) and Fionnuala Darby-Hudgens (CT Data Collaborative and Trinity ‘13) - 12-12:20pm Child Care advocacy questions with Izzi Greenberg (Middlesex Coalition for Children) and Merrill Gay (CT Early Childhood Alliance) - Assign random pairs of students to Build Stage 1: Listen, Find & Question Data, due Tues Sept 19th 9pm on Google Doc, worth 5 points. - Review from prior class: Google Spreadsheet Skills Practice and Google Sheet Sharing Practice Mon Sept 18 - In-class: Brief review of successes and challenges of last week’s Spreadsheet quiz - Before class, read and be prepared to discuss Catherine D’Ignazio and Lauren Klein Data Feminism chapters 1 and 2 https://data-feminism.mitpress.mit.edu, especially these selections: - Chapter 1. Power Chapter begins with a story about tennis star Serena Williams. What do the authors mean by this line? “What we choose to measure is a statement of what we value… and who we value” - Chapter 2 about Challenge Power begins with a comparison of two different maps of Detroit. How do the maps differ, and what do the authors mean when they ask “Who makes maps and who gets mapped?” - Overview of Learning Goal #2: Find and Question Your Data. Start reading HODV Chapter 3 at https://handsondataviz.org/find.html - Challenge power & privilege in data - Clarify levels of data - Recognize public vs private data - Mask or aggregate sensitive data - Explore open data repositories - Source your data - Recognize bad data - Question your data - Prepare for Find and Question Data quiz, to be taken during any 2-hour period before Sun Sept 23rd 9pm on Moodle - Work with your partner to finalize Build 1, due Tues 9pm, and paste the link to your Google Doc shared so that anyone can comment on the Build 1 page before leaving the room Wed Sept 20 - In class: - Read data stories on family income and education access to discuss next week. What are their most insightful claims, and how do they support these with data? - Christian Robles, “Why Child-Care Prices Are Rising at Nearly Twice the Overall Inflation Rate,” Wall Street Journal, August 17, 2023, https://www.wsj.com/economy/child-care-prices-are-rising-at-nearly-twice-the-overall-inflation-rate-2c279c61. Note: This is a gift link. See Trinity Library instructions for students to freely access WSJ. - Aatish Bhatia, Claire Cain Miller, and Josh Katz, “Study of Elite College Admissions Data Suggests Being Very Rich Is Its Own Qualification,” The New York Times, July 24, 2023, sec. The Upshot, https://www.nytimes.com/interactive/2023/07/24/upshot/ivy-league-elite-college-admissions.html, or gift link. See also Trinity Library instructions for students to freely access NYT. - Aatish Bhatia and Claire Cain Miller, “Explore How Income Influences Attendance at 139 Top Colleges,” The New York Times, September 11, 2023, sec. The Upshot, https://www.nytimes.com/interactive/2023/09/11/upshot/college-income-lookup.html, or gift link Mon Sept 25 - Quick review: Can we trust this data? - Overview of Learning Goal #3: Clean Up Messy Data. Start reading HODV Chapter 4 at https://handsondataviz.org/clean.html - Smart Cleanup in Google Sheets - Find and Replace with Blank - Transpose Rows and Columns - Split Data into Separate Columns - Combine Data into One Column - Extract Tables from PDFs (class demo only) - Prepare for Clean Up quiz, to be taken during any 2-hour period before Sun Oct 1st 9pm on Moodle - Discuss key insights and supporting evidence from three data stories on family income and education access (links above) Wed Sept 27 - Class demo: Update on process of cleaning our college access data for classroom use - In-class: Social Explorer Tutorial to Download and Clean Census/American Community Survey town-level data - Assign random pairs to Build 2: Find and Clean Data due Tues Oct 3rd 9pm, worth 5 points. Mon Oct 2 - My response to Miss Manners on Professors and Fist Names - Overview of Learning Goal #4: Make Meaningful Comparisons. Start reading HODV Chapter 5 at https://handsondataviz.org/comparisons.html - Deciphering common US phrases: - apples-to-apples comparison - don’t cherry-pick your data - The big question: “Compared to what?” - Precisely describe comparisons: practice in this Google Sheet - Normalize your data - Beware of biased comparisons - Deciphering common US phrases: - Prepare for Meaningful Comparisons quiz, to be taken during any 2-hour period before Sun Oct 8th 9pm on Moodle Wed Oct 4 - Overview of Learning Goal #5: Chart Your Data. Start reading HODV Chapter 6 at https://handsondataviz.org/chart.html - Chart types - Chart design principles and rules - Create bar/column, histogram, line, area charts Mon Oct 9 No class - Trinity Days Wed Oct 11 - Before class, create a free account on Datawrapper. - Review: Compare student strategies on Covid normalization question - Continue overview of Learning Goal #5: Chart Your Data. Finish reading HODV Chapter 6 at https://handsondataviz.org/chart.html - Compare Datawrapper versus Google Charts - Review line versus area charts with Datawrapper - Create annotated, range, scatter charts with Datawrapper - Hint: When publishing your visualization, always test if your work is visible to the public by pasting the link in a private incognito window in your browser OR a second browser, without being logged into your tool account - In class: Practice choosing the most appropriate chart type and design it - Prepare for Chart Your Data quiz, to be taken during any 3-hour period before Sun Oct 15th 9pm on Moodle. Plan ahead and budget your time because this quiz contains 5 show-your-work questions and may require more time than you have spent on prior quizzes. - Start your quiz by Friday 11:30am if you wish to receive feedback for a second attempt. If you have questions, come to my Zoom Room drop-in (no appointment necessary) on Friday Oct 13th anytime 11:30am-12 noon (see link in Moodle) Mon Oct 16 - Brief review of scatter charts and sample student response 1 and response 2 - Overview of Learning Goal #6: Map Your Data. Start reading HODV chapter https://handsondataviz.org/map.html - Map types (focus on locator point, symbol point, and choropleth maps) - Map design principles and rules - Use Datawrapper to create point and symbol point - Prep for Map Your Data quiz, to be taken during any 3-hour period by Sun Oct 22nd 9pm on Moodle. Wed Oct 18 - Continue overview of Learning Goal #6: Map Your Data, https://handsondataviz.org/map.html - Map types (more about choropleth maps) - Choropleth colors and intervals - Normalize choropleth map data - In-class: Map practice - Prepare for the 3-hour map quiz, start by Friday, and come to my Friday 11:30-12 drop-in time (see link in Moodle). Mon Oct 23 - Brief review of Maps quiz using sample student work: - Overview of Learning Goal #7: Transform Your Map Data. Start reading HODV Chapter 13 https://handsondataviz.org/transform.html - Tutorial: Download and Edit CT Towns for Datawrapper Custom GeoJSON Map - Prep for Transform Your Map Data quiz, to be taken during any 2-hour period by Sun Oct 29th 9pm on Moodle. Wed Oct 25 - Be aware of HODV Chapter 8: Table Your Data, especially the interactive Datawrapper Table with Sparklines, if needed later this semester - Assign Build 3: Explore Data Patterns for Partner Progress Reports. Discuss the question in randomly assigned pairs, but each student writes ONE shared Google Doc and submits the link on Moodle by Sat Oct 28th 5pm, worth 5 points. Mon Oct 30 - Before class: create a free account on Github. Use a relatively short or simple username that you may wish to share professionally in the future. - Overview of Learning Goal #8: Edit and Host Leaflet Code on GitHub. Start reading HODV Chapter 10 https://handsondataviz.org/github.html - Analogy: GitHub Code Repository is like a public cookbook of recipes that you can modify, and GitHub Pages is like an oven that bakes your code into working public websites - Learn in class: Copy, Edit, and Host a Simple Leaflet Map - Bonus: Recipe for Jack’s Semi-Famous Pumpkin Chocolate Chip Cookies on GitHub - Prep for Leaflet Code Editing quiz, to be taken during any 2-hour period by Sun Nov 5th on Moodle. - In-class: Preparing for Progress Reports with Partners (which I will set up) Wed Nov 1 - In-class: Progress Report with community-learning partners on Zoom - 11:40-12:10 (30 min) College Access with Melissa Paul (Hartford Promise) and Fionnuala Darby-Hudgens (CT Data) - 12:15-12:45 (30 min) Child Care with Izzi Greenberg (Middlesex Coalition for Children) and Merrill Gay (CT Early Childhood Alliance) - Start thinking about your preferences for final projects (Builds 4-7). Working in duos is strongly encouraged and priority will be given to students who wish to partner with another student. No more than two students per team, but some projects can be divided into coordinated separate teams (working on related questions and data, but graded separately). While you can choose to work solo, you will be held to the same expectations as a duo. Mon Nov 6 - Syllabus revision and cancellation of one quiz - Brief overview of Learning Goal #9: Explore Leaflet Map Code Templates. Start reading HODV Chapter 12 https://handsondataviz.org/leaflet.html - Leaflet Maps with Google Sheets - Leaflet Storymaps with Google Sheets - and sample by Savannah - Quiz 9 is cancelled (all receive full credit), but Quiz 10 will be assigned in next class - In class: Explore sample data stories by students on past projects - Overview of Child Care and College Access project questions. Submit your preferences in Google Form for Builds 4-7, with final decisions made by instructor to balance numbers. - Assign Build 4: Describe Plan and Draw Visualization Ideas, due by end of Wed Nov 8th on the class Google Doc, worth 5 points. Before leaving the room, create links to your co-authored Google Doc and share so that anyone can comment. Wed Nov 8 - Review Build 4 instructions and updates, due tonight 11:59pm - Overview of Learning Goal #10: Embed on the Web. Start reading Chapter 9 https://handsondataviz.org/embed.html - Static images versus interactive iframes - Get the iframe embed code for a published visualization - Embed the iframe code in an HTML web page - Make your own copy of dataviz-story-template from GitHub and follow instructions inside the - Start Embed on the Web quiz, due by Sun Nov 12th 9pm on Moodle. - Workshop time for remainder of class: ask questions to instructor or TA, work on Build 4 or Quiz 10, etc. Mon Nov 13 - Overview of Learning Goal #11: Tell and Show Your Data Story. Start reading HODV Chapter 15 https://handsondataviz.org/story.html - Build Narrative on a Storyboard - Draw Attention to Meaning - Acknowledge Sources and Uncertainty - There is no separate Moodle quiz, because this content is combined with the Build 5 below for 10 points total. - Assign Build 5: Data Story Draft. Tell a meaningful data story on your assigned question, at least 750 words plus at least two visualizations, for review by instructor (and later by peers). Due by Sun Nov 19th 9pm as a Google Doc shared for anyone to comment with links to related data files and/or visualizations, worth 10 points (combined value of Quiz 11 and Build 5). - Practice applying evaluation criteria to data story by former student Wed Nov 15 - Brief Zoom meeting with guest expert evaluator José Luis Martínez, Data Reporter at CT Mirror. Read one of his data stories, such as “CT Food Deserts: In 24 towns, no stores accept food stamps,” CT Mirror, April 16, 2023, https://ctmirror.org/2023/04/16/ct-food-stamps-snap-benefits-food-desert/. - Updated three unknown degrees in Hartford Promise data, with changes shown in yellow, and auto-updates to pivot tables - In-class workshop time for Build 5 - Insert links on the Build 5 Google Doc, share so that anyone can comment - Schedule 20-minute Zoom appointments on my calendar for Monday Nov 20th or Tuesday Nov 21st. If working with a partner, be sure to share the appointment information, since both of you must attend the meeting at the same time to earn participation credit. - Check-in meetings with instructor (build 4 feedback) and TA (to-do list) Mon Nov 20 - In place of our regular class, duo/solo 15-minute Zoom meetings with instructor for Build 5 feedback, for participation credit. Wed Nov 22 - No class - Thanksgiving Break Mon Nov 27 - Let’s support and coach each other to successfully complete our semester - Before class: Make any revisions you wish to your Build 5 drafts, and make sure they are shared for anyone to comment - In-class: Peer review assignments with evaluation criteria, due during class, for participation credit. Students must submit a full draft in order to participate in the peer review. Choose to either type comments into a shared Google Doc or hand-write on paper. Share copy with instructor who will evaluate the quality of constructive feedback. - Assign Build 6: Data Stories for Community Partners. Improve draft based on feedback, and migrate all content from Google Doc to GitHub Pages format, due Monday Dec 4th 2pm for instructor to forward to partners (for non-graded comments and participation credit). - Tip: An efficient method to edit your data story on your computer: - In GitHub, download your index.htmlfile to your computer - Use a text editor tool (not MS Word) to edit downloaded index.html. For example, Pulsar is my favorite open-source text editor. - While using text editor to revise and save changes to your computer, simultaneously view how they appear in your browser with File > Open File > downloaded index.html. Since this version is temporarily stored on your local computer, your browser bar will display its location in a local format file:///...rather than the online format - After editing, upload your newer index.htmlfile from your computer to replace the older version on GitHub. OR copy and paste the contents of the newer version in place of the older contents on GitHub. - In GitHub, download your - Tip: Avoid deleting important HTML formatting in your data story template like this common mistake Wed Nov 29 - Overview of Learning Goal #12: Detect Lies and Reduce Bias. Start reading HODV Chapter 14 https://handsondataviz.org/detect.html - How to Lie with Charts - How to Lie with Maps - Recognize and Reduce Data Bias - Recognize and Reduce Spatial Bias - Prep for Detect Lies quiz, to be taken during any 3-hour period by Sun Dec 3rd 9pm on Moodle. - In-class: Rehearse 1-minute presentations of highlights from your draft data stories for upcoming Build 6 meeting with community partners. You will have more time for 2-minute presentations for the Build 7 meeting with guest experts. - Feel free to schedule a Zoom appointment on my calendar for feedback on your build. If you are working with a partner, please arrange to meet me at the same time if feasible. Mon Dec 4 - In class: Student course feedback on what helped you learn. In addition, please fill out the College’s standard online evaluation form when available. - Review presentation lineups for Build 6 with Community Partners and Build 7 with Guest Evaluators - Everyone: Insert your GitHub Pages data story links in Google Docs above, and you can improve and revise until cut-off times - Decisions to make before your data story is “frozen” and published on the public Partners and Projects page: - Insert your full name (recommended), or you have the right to use only your first name or initials - See what other students did in my “Public Writing and Student Privacy” chapter of Web Writing book (2015). - Recommended: Insert link to your published data story in your resume to demonstrate your skills and knowledge to prospective employers and graduate schools, which shows more than simply listing “proficient in…” at the bottom. - Keep in touch: See my Advising page on “How to request a reference or recommendation letter” - Workshop time to finish data stories in preparation for community partner meetings Wed Dec 6 - In-class: Build 6 Data Story Feedback with Community Partners on Zoom. Deliver 1-minute presentation of highlights in your data story to community partners, then listen to their non-graded feedback and write down revisions to consider, for participation credit. - 11:30-12:10 (40 min) College Access with Melissa Paul (Hartford Promise) and Fionnuala Darby-Hudgens (CT Data) - 12:15-12:45 (30 min) Child Care with Izzi Greenberg (Middlesex Coalition for Children) and Merrill Gay (CT Early Childhood Alliance) - Community partners have agreed that our session will be video recorded. and the instructor will share the link on Moodle (not the public web). Also, if students wish to quote a community partner response to their work in Build 7, the student must email the exact wording of the quote to the partner (with cc: to instructor) as soon as possible for approval by the partner. - Assign Build 7: Revise and Finalize Data story for guest experts due Fri Dec 8th at 12:45pm. There are No extensions because your data story will be “frozen” and a copy will be transferred and published on our public Partners and Projects page, and forwarded to our guest experts, who need to read your work before your presentations. Worth 10 points, scored by guest experts. Mon Dec 11 - Build 7 Final presentations on Zoom with guest evaluators: José Luis Martínez, Data Reporter at CT Mirror, and Ilya Ilyankou, HandsOnDataViz co-author and Trinity Class of 2018, now PhD student at University College London researching Large Language Models and complex route planning, LinkedIn page. - Class will begin at 11:30am and end at 1:20pm and will take place in my Zoom room to ensure all students have sufficient time with guest experts. Students only need to attend their assigned 10 minute time slot and must log into my Zoom room a few minutes before it begins. - Build 7: Guest experts will review final data stories online before the event. Students will have up to 2 minutes to orally present highlights, then 4-5 minutes to respond to questions from evaluators about your data analysis, storytelling, and design decisions. Worth 10 points, scored by guest evaluators.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00624.warc.gz
CC-MAIN-2024-18
31,170
280
http://www.encyclopedia4u.com/s/self-reference.html
code
Self-referenceA self-reference occurs when a statement refers to itself. Reference is possible when there are two logical levels, a level and a meta-level. It is most commonly used in mathematics, philosophy, computer programming, and linguistics. Self-referential statements can lead to paradoxes (but see antinomy for limits on the significance of these). An example of a self-reference situation is the one of autopoļesis, as the logical organisation produces itself the physical structure which create itself.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698289937/warc/CC-MAIN-20130516095809-00028-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
514
2
https://www.cstechera.com/2015/09/
code
Networking is very powerful area which allows different machines to get connected. Human life became very easy through the networking concepts. Lets start the discussion of the same with understanding basics of the Networking & How to do it in JAVA. Networking allows communication between 2 or more computers. The diagram shown here is just for example to get an idea of how networking is done. Only one Server & 8 Clients are shown in the diagram. Clients makes requests to Server & Server serves those requests.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101195.85/warc/CC-MAIN-20231210025335-20231210055335-00226.warc.gz
CC-MAIN-2023-50
514
2
https://www.ghluxe.com/forum/real-estate-forum/install-windows-95-dosbox-android-download-fix
code
Install Windows 95 Dosbox Android Download Fix Emulation is a very difficult process, thankfully Windows 95 has very little requirements. On the phone it works perfectly like on a computer, if someone wants to have the operating system on the phone it's only Windows 95. You will need the limbo application to install windows on your phone. For users there is a regression, things that used to work are no longer working. It doesn't really matter which component is doing something wrong, the end result is that the user can't work.If the reason for this is "we opted to go with this new tool" then the cause for the regression is that new tool (even if the technical fault is that some other component doesn't quite comply with the specs, but in a way that never mattered before.This also points out the difference between the official spec of the API and the practical spec (how much of the official spec you really need to implement to make things work (the de-facto spec). As a practical matter, things that don't need to be implemented 'properly' to make things work probably won't be, so if you later change things in such a way that they break if these previously 'optional' things aren't right, you need to think really hard about what value you gain by requiring these things to be right and what fallback options you can provide (either ignoring the broken info or extracting what value you can get from the broken info) rather then breaking completely.there are quite a few people doing infrastructure work for linux that don't pay attention to this sort of thing, and this causes all sorts of problems for users. the case mentioned above where script headers didn't matter before, but break under systemd is a perfect example of this, but the systemd developers are not the only offenders.If you are really starting from scratch, with no installed base (like Android did), then you can just implement the new way of doing things without worrying about backwards compatibility, but if you are writing something that you hope to get added to an existing system (and this includes writing a new version of an existing system, android ICS, Gnome 3, KDE 4, systemd, etc), then you do have to deal with backwards compatibility and the de-facto standard.Yes, thee are times when you can decide to break the de-facto standard (not being willing to do so under any condition leads to a windows-like mess), but you should be very reluctant to do so. Poettering: systemd for Administrators, Part XII Posted Jan 27, 2012 17:06 UTC (Fri) by jeremiah (guest, #1221) [Link] I actually have the original C&C disks. I've tried to install C&C from them, but disks have become unreadable over the years. So I downloaded it from TPB and installed it just fine in Win7 in compat mode.There's a good story about Windows compatibility - they've actually made a special-purpose memory allocator for Win95 to work around a bug in Sim City.Read it here: - that's how much MS cared about compatibility. That's funny. really... Posted Jan 26, 2012 19:56 UTC (Thu) by HelloWorld (guest, #56129) [Link] Users _do_ complain about formatting differences and doc format incompatibilities when switching back and forth or dealing with others. But there is nothing _wrong_ with what OO does, its just the network effect of many more office users and (so far as I know) current office still not supporting ODF out of the box.Continuing the general anecdoates of 'normal users' switching to windows. I know two who used to be Ubuntu users but now have Windows laptops. That's mostly because their new machines came with Windows and they didn't have huge incentives to change it. Most of that was that its just easier to be doing the same as the majority (doc formats, general knowledge on how to fix things).I help one get access to a mercurial repo a few days ago and she immediately recognised that this would be _so_ much easier on ubuntu because she could just do apt-get install mercurial; hg clone .On windows it was a faff. She kept saying 'Windows is fine so long as you aren't trying to do anything more that browse and write docs'.So users do understand, and it's not really about proprietary apps. It's largely inertia in terms of what comes with the machines, combined with the networks effects (at least in these cases). Poettering: systemd for Administrators, Part XII Posted Jan 23, 2012 14:44 UTC (Mon) by pyellman (guest, #4997) [Link] My now 14-year old daughter learned to use the Gimp alongside various commercial alternatives (Photoshop, Corel), and, at this point, immediately downloads and install the Gimp on any machines she uses, despite having access to aforementioned commercial alternatives. She is quite competent with all the products mentioned. This was with absolutely no pressure from me, other than introducing her to the Gimp (nearly 6 years ago) and a one-time discussion of its benefits, which include always having access to that software.If you are ever in the Charlottesville, Virginia, area, please stop by and I will introduce you. Poettering: systemd for Administrators, Part XII Posted Jan 23, 2012 22:32 UTC (Mon) by cmccabe (guest, #60281) [Link] 2b1af7f3a8
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00239.warc.gz
CC-MAIN-2023-14
5,179
6
http://www.ipadforums.net/threads/sync-i-pad-with-laptop.125777/page-3
code
We are talking about two different apps. One is for your iPad, and found in the iTunes Store. The other is for your Windows computer, and found on the developer's website. You download it in your web browser (Explorer, FireFox, Chrome, Safari, whatever) while using the computer. If you find yourself back in iTunes when trying to download the computer version, you chose the wrong option on the site. When both are installed, you launch both on each device. Select the photos you want to send on the iPad and go through the choices till it syncs with the computer. An exporter window on the computer will open with the images. I don't know what folder it shows up in for Windows. On the Mac they show up in the Pictures folder under a subfolder called iPad. I images it is similar on the Windows, which also has a default folder for images/pictures. You should be able to change where the pictures go by default by changing the app's preferences on the computer. On my Mac, the app doesn't open a window by default when you start it. Instead it shows up in the menu bar. When you want to send photos from the computer to the iPad I go there, choose the Send option, and it opens a finder (explorer window) so I can browse and select the files.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948593526.80/warc/CC-MAIN-20171217054825-20171217080825-00166.warc.gz
CC-MAIN-2017-51
1,244
1
https://blogs.msmvps.com/brianmadsen/2006/09/09/asp-net-2-0-how-to-use-the-new-validation-features-part-1/
code
With the release of ASP.Net 2.0 came a host of Validation features. In this series I'll be touching on those and show you how easily it now is to create validation for your forms. In part 1 i'll be showing a new feature/property of existing validation tools – namely the ValidationGroup property. With this property you can now gather section specific validation together, so now there's no need to assess what to validate on PostBack. In forms where you have several sections – some which might be dependant on others – some which might be individual and not be required. You can still validate these very easily should somebody input data into the fields. For the purpose of illustrating this feature i'll be creating a very simple login form (not using any of the Login controls in ASP.Net 2.0). as you can see, i've used the following controls here: - Label – Username - Label – Password - TextBox – Username - TextBox – Password - Button – Login - RequiredFieldValidator – Username - RequiredFieldValidator – Password To group them all together in the same ValidationGroup you need to set the group name in the ValidationGroup property, which can be found at the very bottom of the property list if you sort it alphabetically. I chose to use LoginForm as the ValidationGroup name. This will have to be done for each control you want to be grouped together. Now on each of the RequiredFieldValidator controls i'll set the ControlToValidate and Display property. Now the reason for selecting None in the Display property is that i want the ErrorMessage value to display in the ValidationSummary. Simple as that – you've now grouped the fields together with the ValidationSummary and both RequiredFieldValidator controls and can have several grouped validation rules in place on the same form.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991737.39/warc/CC-MAIN-20210514025740-20210514055740-00352.warc.gz
CC-MAIN-2021-21
1,817
17
https://virtualvcp.com/itemlist?start=20
code
vSphere 6 makes managing SSL certificates a lot easier than previous releases. It ships with its own Certificate Authority, (VMCA) that issues certificates for all components on your behalf, rather than having to replace each service certificate manually, or relying on self-signed certificates. This new VMCA comes with the Platform Services Controller (PSC) that can be installed as a separate appliance, or embedded within the vCenter Server installation or Appliance. By default, the VMCA will self-sign its own certificate to be used as a CA certificate that will sign all requests for certificates. This self-signed CA certificate can be replaced by a certificate that is signed by a 3rd party root CA or your own root CA. Any certificate signed by the VMCA, which is an intermediate CA to your root CA, can then be validated by clients with the root CA and VMCA certificates installed. I've decided to create this dedicated page where I'll place "one line scripts". I sometimes use these one line commands to run reports on vSphere or SCVMM inventories, if I'm not permitted or able to run full length scripts in an environment. Yesterday I found myself in the middle of a debate on Twitter surrounding DevOps and the future of infrastructure admins. The whole thing was really triggered by a tweet sent by John Troyer where he stated; "Both O'Grady (New Kingmakers) & Chen (Developer-Driven Infrastructure) say "Devs Rool, IT Droolz". How do IT pros adapt?" I've built up and tore down my vRealize Automation lab several times in the past month in order to familiarize myself with some of the pitfalls. As a result, I've run into some installation gotchas that I noted down, and decided to post them here. VMware vRealize Automation makes it easy for us to provide our end users with the ability to request and manage their own virtual machines using a “self-service” portal. With very little configuration required, we can add vSphere virtual machine templates to a vRA service catalog for users to consume. vRA can then handle the request management for new virtual machines and when approved by the appropriate approvers, even provision the new VMs by cloning the template. I’ve recently published a whitepaper on KEMP Technologies’ range of commercial "LoadMaster" load balancer products that can be found via this post. Now KEMP has introduced a free version to their LoadMaster range of products. This is to provide small businesses and developers with robust and proven load balancing capabilities free of charge.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161214.92/warc/CC-MAIN-20180925063826-20180925084226-00163.warc.gz
CC-MAIN-2018-39
2,536
7
https://developer.vmware.com/apis/vrealize-operations/vrealize-operations-cloud-api/latest/suite-api/api/maintenanceschedules/delete/
code
Delete Maintenance SchedulesDescription Using this method, you can delete a particular maintenance schedules Maintenance schedule identifiers This operation uses the following authentication methods. No error details were provided in the OpenAPI specification.Code Samples curl -X DELETE https://localhost/suite-api/api/maintenanceschedules?id=string
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00652.warc.gz
CC-MAIN-2023-06
350
6
https://www.tildajyrasalo.com/heibus
code
Fostering empathy between a bus driver & passengers How does the interaction between a driver and passengers inside HSL buses affect the emotional comfort? On the course User Inspired Design we were supposed to come up with a social innovation. We decided to work with buses in Helsinki region as buses are places used by a diverse and large group of people every day. We believe the experience of riding a bus should not add more stress to our everyday lives. How we gathered knowledge: Communication tool to foster empathy Our concept HeiBus is a collection of platforms for drivers to communicate with the passengers. As our research indicated, the drivers are physically isolated from the rest of the bus and as such, communication can be challenging. HeiBus can be implemented using existing system on the bus and bus stops while adding new ways of communicating, which in turn will improve the customer experience for the passengers. The messages foster empathy and understanding between drivers and passengers. At the same time, it gives the driver an improved opportunity to be “acknowledged” or “seen” by the passengers. HeiBus consists of three different outputs for which messages are supplied by drivers, bus operators and HSL.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672548.33/warc/CC-MAIN-20191017022259-20191017045759-00404.warc.gz
CC-MAIN-2019-43
1,247
7
https://www.technojobs.co.uk/unix-jobs/bristol
code
Full Stack Developer Bristol up to £40k depending on experience Full Stack Developer required for rapidly growing e-signature service company As Full Stack Developer, you will help design and build new features and improve existing ones for this electronic signature service company. Based in the company offices in central Bristol, you will be pushing code to the production... Linux, AWS, Puppet, Scripting, Automation, Amazon Web Services My client is a leading Agile Consultancy, with an impressive client base across many industries including, investment banking, energy, banking, e-commerce and public sector. They are looking for highly skilled and technically strong DevOps Engineers to join their existing team. The Engineer works primarily...
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815951.96/warc/CC-MAIN-20180224211727-20180224231727-00722.warc.gz
CC-MAIN-2018-09
753
6
https://www.peopleperhour.com/marketing/member/contact?id=975918&job=H279119
code
What you get with this Offer I will fix any error related to linux instance. I'll fix any error related to bind, apache, nginx, mysql, postfix. I've more than 8 years of experience of linux server mainly on CentOS, Ubuntu and Debian. I've done many successful job in the past. When I'm working for a client more...
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141197278.54/warc/CC-MAIN-20201129063812-20201129093812-00360.warc.gz
CC-MAIN-2020-50
314
6
https://technet.microsoft.com/en-us/library/cc747618(v=ws.10).aspx
code
Trusted User Domains Updated: June 1, 2008 Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2 By default, RMS does not issue use licenses to users whose rights account certificates were issued by a different user domain. A user domain is an RMS installation that consists of a root cluster, optional licensing-only clusters, and associated databases. You can configure RMS so that it processes this type of request by importing the server licensor certificate of another user domain, and adding it to the list of trusted user domains. When you do this, users whose account certificates were issued by the trusted user domain can submit requests for use licenses to your installation. These use licenses will be processed as if they were requests from internal users. |The root cluster is automatically on the list of trusted user domains for all RMS clusters in the same installation.| You can allow users from different user domains to share protected content. This is described in the following examples: Your organization is working closely with another organization on confidential documents that you want to share and protect. The other organization is also running RMS. The two organizations can add each other's RMS installation to their list of trusted user domains, so that users who are in both organizations can work together on rights-protected content and exchange it over the Internet or on an extranet. You can have only one RMS installation in each Active Directory forest. Your organization has deployed more than one Active Directory forest, and they are each running RMS. Users want to share rights-protected content with other users, regardless of the forest in which they reside. To allow this, you can add the RMS installation of the other forests to the list of trusted user domains that are in each forest. Users who are in your organization are working with users in another organization on confidential documents that they want to protect. The other organization is not running RMS. Users who are in the other organization can establish Windows Live ID accounts, and you can add Windows Live ID to the list of trusted user domains for your RMS installation. Users in both companies can now work on rights-protected content and exchange it over the Internet. For more information about trusted user domains and step-by-step instructions, see "Adding and Removing Trusted User Domains" and "Establish Trust Policies" in "RMS: Operations " in this documentation collection.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275835.98/warc/CC-MAIN-20160524002115-00244-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
2,561
11
https://medium.com/@core_dao/the-role-of-validators-in-satoshi-plus-b9f70b3f6125?_branch_match_id=link-1126868155843058466
code
The Role of Validators in Satoshi Plus: As discussed in Satoshi Plus Consensus and the Core docs, Validators play a critical role in the Core blockchain network. Validators are “Responsible for producing blocks and validating transactions on the Core network. Becoming a validator requires registering with the network and locking up a refundable CORE deposit in order to be included in the validator set. Anyone can deposit and become a validator on Core.” For their efforts, Validators and their delegates receive block rewards and transaction fees. Delegation in Satoshi Plus: Given Satoshi Plus is a hybrid of Proof of Work (PoW) and Delegated Proof of Stake (DPoS), it has 2 distinct groups of delegates. Both play a role in ensuring the proper checks and balances are in place in the system. One group consists of Bitcoin miners who delegate their hash power to Validators. This is a non-dilutive process to their Bitcoin mining and is verified via a trustless mechanism that ensures they are the owner of the private key (PK) that corresponds to the coinbase address linked to the hash power they’re trying to delegate. The second group consists of CORE holders who delegate their stake to Validators. This is a familiar process to staking on other PoS/DPoS chains where you sign a transaction attributing your stake to the total stake represented by the Validator. Validators are elected in proportion both to their delegated hash and delegated stake. This function is referred to as the “hybrid score” and the top 21 validators are included in the Validator Quorum for ~24 hrs (1 Round) before the process repeats. Once elected, individual Validators produce blocks in a round robin manner, (Validator 1, Validator 2, Validator 3, … Validator 21, Validator 1…), until their 24 hr period has elapsed. Validator Rewards and Distribution to Delegates: Validators are compensated for their work by receiving block rewards and transaction fees. These block rewards are split amongst the Validator (optional commission %) and both sets of delegates. The hash power delegates receive rewards proportional to the entirety of the hash power represented on the Core network. The stake delegates receive rewards proportional to the entirety of the delegated stake on the Core network. An applied example of the calculations involved is in Core’s documentation. Given the information above, a market will likely form as Validators seek to attract both sets of delegates. Validators will compete on commission, trustworthiness (non-Byzantine behaviors), operational excellence (uptime, liveness, etc), and other factors. Given these market forces, the Validator Quorum is likely to be actively changing vs stagnant. This is a significant difference from other PoS/DPoS/PoA systems where the Validator Quorum is either fixed or unchanging given the immense capital requirements needed to get elected into the set. Another key difference is that the two groups of delegates introduce checks and balances into the system. The exogenous Bitcoin miner hash delegation allows for Bitcoin’s philosophy and ethos to permeate the Core ecosystem and play a direct role in consensus, thereby balancing out the influence and interests of the CORE holders. The two groups have a symbiotic relationship and play a crucial role in Satoshi Plus Consensus.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00870.warc.gz
CC-MAIN-2023-40
3,353
11
http://flowingdata.com/2013/06/02/geography-of-tweets/
code
Twitter mapped all the geotagged tweets since 2009. There’s billions of them, so as you might expect, roads, city centers, and pathways emerge. And it only took 20 lines of R code to make the maps. Pretty interesting. +1 to take the same maps and compare them with world population to get a sense of geo-biases in twitter data. It’ll probably take a few more than 20 lines to get ‘er done, but it would be a compelling view of any biases that we may see in Twitter! Too bad they didn’t make the data available! Although I guess that would “go against” their “business model” or something. So where are those 20 lines of code? Google ggmap. You’ll find quite a few examples. Are these maps of geotagged tweets or of geotagging tweeters ? A map of communications or of communicating users ? Become a member. Learn to visualize your data. From beginner to advanced. What you get For various occupations, the difference between the person who makes the most and the one who makes the least can be significant. We know spending changes when you have more money. Here’s by how much. Most of the major pizza chains are within a 5-mile radius of where I live, so I have my pick, … Many lists of maps promise to change the way you see the world, but this one actually does.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189403.13/warc/CC-MAIN-20170322212949-00067-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,286
14
https://teachla.uclaacm.com/resources
code
We've developed an open-source online code editor specifically targeted towards students learning how to code. Students can sign up easily, and our service stores and runs their code - which removes issues about using a specific computer, and allows students to access their code anywhere! We currently support Python, HTML, and Processing, and plan on adding more features soon! Here are our team's favourite resources for learning more, organized by topic and relevant course material: These are our favorite AI/ML resources! We've ordered them by how relevant and useful we think they are, but they're all awesome.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878519.27/warc/CC-MAIN-20200702045758-20200702075758-00253.warc.gz
CC-MAIN-2020-29
617
3
http://tibasicdev.wikidot.com/deleted:boolean
code
Note: The Piecewise Expressions page more clearly spells out the concepts discussed within this page, so please link to that page instead. Boolean logic is the way that the calculator expresses logical statements. A statement can have either one of two values, true or false, and can be as simple or complex as you want. For example, if we were evaluating a proposition from a sentence, such as "It is cold in Minnesota…", this proposition can only be true or false at any one time — in this case, it is definitely true :D While we humans are able to think about a proposition and evaluate its truth-hood rationally, the calculator has its own built-in system based strictly on math for determining whether a logic statement is true or false. In addition, the calculator uses a value of zero (0) to signify false, and one (1) or any other non-zero number (including negative, decimal, and even complex) to signify true. The primary places where you will see Boolean logic used are in conditionals and loops, although its application and impact can be felt almost everywhere. A typical conditional in TI-Basic looks something like this: :If A=5 :B+4→B When the calculator evaluates the A=5 statement, it will get back either a value of zero or one. If it gets a one, that means the A variable had a value of five at the time, and it will subsequently go ahead and execute the statement immediately following on the next line (i.e., B+4→B). However, the next statement will be completely skipped over if a zero is returned. Although the statement in the previous example is already pretty simple, you can in fact go even simpler, and just use 1 or 0 as the statement. Because both of them are absolutes, meaning their value never changes, the statement will essentially be executed or completely skipped over each time indefinitely — there is no need to do any evaluating because there is nothing to evaluate. In terms of practical use, you could use a While 1 loop as the main program loop that encompasses the entire program. Because a While loop has no built-in capability to break out of the loop, it would not end until you manually exited it (by pressing the ON key). :While 1 :Disp "Hello World :End Similarly, you can use a While 0 loop (or If 0 conditional) for making comments in your programs, as well as creating a special kind of subprogram which exists entirely inside a program. Both of these applications are somewhat advanced, but they nonetheless still rely on Boolean logic to work. The most useful, and common, application of Boolean logic is what is known as Boolean conditionals. Boolean conditionals work best when just manipulating one variable, and the way they work is by putting the condition statement inside parentheses, and then placing it right next to the value that you are manipulating the variable by. For example, here is what the original conditional would look like: Because the calculator uses math for determining the value of a statement, it will first evaluate the statement inside the parentheses (which is our A=5 statement), and return 1 or 0, respectively. The calculator then multiplies that value by the value you are adding to the variable (in this case, 4), and stores the result to the variable. A helpful way to look at it is by replacing the statement with the literal 1 and 0 numbers: As you can see, the calculator will multiply 4 times 1, and then store that to B (so B will now have a value that is increased by four). If you replace the 1 with 0, the calculator will still multiply and store a value to B, but it will instead turn out to be 0 (because anything multiplied by zero equals zero; it's a basic law of algebra), so the B variable will still have its original value. Of course, your Boolean conditionals don't have to be that simple — you can have multiple conditions with almost any combination of commands, functions, and operators, and the calculator will evaluate them like it would anything else. One of the most common Boolean conditionals that you will see involves using the arrow keys to move a character around the screen: :getKey→K :Y-(Ans=25)+(Ans=34→Y :X-(K=24)+(K=26→X In this particular example, there are two conditionals used because you can move in the Y direction (which is represented by the first conditional and uses the up and down arrow keys) and the X direction (which is represented by the second conditional and uses the left and right arrow keys), so you need to keep track of two separate variables, and likewise update each variable independently of the other.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121267.21/warc/CC-MAIN-20170423031201-00201-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,574
16
https://hijabiworld.com/vlog-330-am-morning-routine-muslimah-medical-student-skin-care-fajr-food-anime-one-piece-%F0%9F%8C%BF/
code
VLOG | 3:30 AM MORNING ROUTINE, muslimah medical student, skin care, Fajr, food, Anime, One piece 🌿 Hi, and welcome back to another vlog! Today i am sharing what a typical morning looks like for me. I wake up for prayer at 3:30 then go back to sleep until around 8. I tried making this as authentic and realistic as i could but of course not every morning is going to look the same. Thank you for watching, i hope you enjoy and subscribe! Love, Mary ❤️ Video Source & Full Credit
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00676.warc.gz
CC-MAIN-2023-06
486
4
https://www.webdesigner-profi.de/joomla-webdesign/joomla-shop/forum/posts/13/10268.html?lang=de
code
i need that users in the checkout have to put them VAT code in the address form, so from the joomshopping backend i set in that way the custom field 1, then i read on the forum that i have to translate the lang. file to customize the field label. i customized the it_IT.php file but after that i load it on the server i have back this error Parse error: syntax error, unexpected T_STRING in /web/htdocs/www.DOMAIN.it/home/components/com_jshopping/lang/override/it-IT.php on line 1 i followed your guide to translate the language file and i used notepad++ to save the file (following your indications that i found on this forum) How can i fix this issue? Thanks a lot
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866326.60/warc/CC-MAIN-20180524131721-20180524151721-00509.warc.gz
CC-MAIN-2018-22
666
6
https://community.atlassian.com/t5/Statuspage-questions/cannot-create-a-slack-channel-when-I-try-to-integrate-my/qaq-p/1746388
code
I am trying to integrate our status page with slack but when I try to create the channel is giving me error, saying that channel name is invalid. This is the channel name #eden-statuspage Hi @maximiliano , Up at the top-right of that screen, you should see a Slack workspace URL in the "Webhook URL" box. (More details on Slack integration in our documentation) Can you confirm that the channel #eden-statuspage already exists in the Slack workspace listed at that URL, and that your user account can open that channel? Daniel | Atlassian Support P.S. - if you're just looking to pipe incidents into that channel (i.e. you don't want the updates for Team members, Long-running open incidents, or Long-running degraded components), you can use the Slack subscription option to simply add the channel as a subscriber to your Statuspage instead of configuring the full integration. See our product documentation for details on how to set this up and how it works We're excited to announce the release of a long-requested feature on Statuspage. Now visitors to your status page can subscribe to get notified in Slack when you report an incident or maintenance. Th... Connect with like-minded Atlassian users at free events near you!Find an event Connect with like-minded Atlassian users at free events near you! Unfortunately there are no Community Events near you at the moment.Host an event
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00159.warc.gz
CC-MAIN-2022-27
1,388
10
https://vbrownbag.com/2011/02/vcenter-out-of-space-a-lesson-on-shadow-copy/
code
Ran into an issue today where my vCenter would not come back up after a reboot. Standard troubleshooting ensued… the DB is up, it is accessible, odbc is Kosher, etc. At that point, Windows helpfully popped up a message balloon: “I pity the fool who runs outta disk space!” So I dug, and a dug… and the numbers were not adding up… the system folders, vCenter folders, etc only accounted for ~2GB of a 50GB disk. So where was it? That’s when I found this helpful gem: Note: it’s cleared out now, but… it was reading “Disabled” and “Used: a metric ton” Shadow Copy? What is this? Seemingly some process, Updates, Backups, something, was taking shadow copies of the volume. So… now we need to make it go away: From a command line: wmic shadowcopy delete Note, that makes them all go away. If you’d like a list: 4 thoughts on “vCenter out of Space! – A Lesson on Shadow Copy” This is a ‘can’ be a problem on windows boxes and like you said, is likely caused by a backup not cleaning up the shadows. (Backup Exec, netbackup etc). Some helpful tips around this: 1) Make sure you have the latest VSS hotfixes for windows (microsoft seems to release some every few months) 2) use ‘vssadmin’ to manage where/how big etc you want your shadows. For example, you can route the shadows for c: to a different volume to make sure it never fills up the c: drive. For our mission critical boxes, we have a dedicated s: drive for shadow copies to make sure they can’t fill them up. You can also set LIMITS for shadow copies as another alternative. by default, they are set to UNLIMITED so will fill a whole drive if given the chance. Thanks for this! Comments are closed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00270.warc.gz
CC-MAIN-2023-23
1,696
15
https://mathslinks.net/faculty/calculus-the-graphic-relationship-between-a-curve-and-its-first-and-second-
code
This is a GeoGebra applet for demonstrating the graphical relationship between a cubic and its first and second derivative. I have attached a version optimized for 1280x800 resolution, and also a version that is optimized for use on an IWB. It is a highly visual tool, all of the co-efficients of the cubic curve are controlled via sliders to show the constantly variable relationship between a curve and its derivatives. The derivative curves (and tangents to these curves) can be turned on and off via a series of checkboxes on the screen. All tangents can be moved around the curves to demonstrate gradients, points of inflexion etc etc. Download and enjoy! 16 November 2012 Edit: 28 February 2014 Shared by Ciaran Quinn 1
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00230.warc.gz
CC-MAIN-2023-40
725
7
https://hls.harvard.edu/faculty/directory/11655/Cushman
code
Lecturer on Law Jack Cushman is a fellow of the Berkman Klein Center for Internet and Society and a member of the Harvard Library Innovation Lab, where he works on projects at the intersection of law and computer science. Those projects include Perma.cc, a tool to fight legal reference rot that has been adopted by the majority of American law schools, and the Caselaw Access Project, which is exploring new legal research methods based on digitization of 40,000 volumes of caselaw at the Harvard Law Library. Other ongoing research topics include jurisdictionally diverse archival encryption, crowdsourcing of legal knowledge regarding copyright law, and market concentration in web hosting. Before coming to Harvard he worked as an appellate attorney in Boston and as a computer programmer.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347417746.33/warc/CC-MAIN-20200601113849-20200601143849-00429.warc.gz
CC-MAIN-2020-24
793
2
https://www.alphaa.ai/blog/blog-home
code
Wikipedia defines a Chabot as “a computer program or an artificial intelligence which conducts a conversation via auditory or textual methods. Such programs are often designed to convincingly simulate how a human would behave as a conversational partner”. Conversations are also easier to understand, decode and personalized compared to graphs or visual-based insights. They have been proven to drive user adoption of technologies and has the power to significantly improve data literacy across organizations, allowing for better data literacy. NLP and text analytics involves a set of statistical techniques for identifying parts of speech, entities, sentiment, and other aspects of the text What Alphaa AI does is a niche capability associated with text analytics and sentiment analysis, and it’s not something that mainstream BI and analytics vendors do deeply on their own. Traditionally, business intelligence tools are complex and difficult to navigate. Furthermore, they are visually driven which means that analysts or the end consumer still has to create his own story and insights from the dashboards. Artificial intelligence is a hot topic nowadays but ranges from simple, robotic tasks such as rule-based bots to high impact cognitive computing technologies such as augmented analytics. Organisations are struggling to create a data driven culture. Often this is because creating a data driven culture is left to the technology teams. Tableau’s NLP addition has arrived at the perfect moment, giving us an easy way to ask questions to our data. By bringing NLP to the table, Tableau aims at swishing all-new budding aspirants in the BI market today. Now Imagine, if you had the same dashboard but you could ask questions and obtain compelling business story in voice with a simple click of a button Data translators are difficult to find. This is primarily because there exists no formal certification or diplomas catering to them. Secondly, finding individuals who possess deep industry and company knowledge is difficult.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00240.warc.gz
CC-MAIN-2022-49
2,043
10
http://www.kekw.org/blog/the-woman-who-can-smell-parkinsons-disease
code
"She says: "His smell changed and it seemed difficult to describe. It wasn't all of a sudden. It was very subtle - a musky smell. "I got an occasional smell." Joy only linked this odour to Parkinson's after joining the charity Parkinson's UK and meeting people with the same distinct odour. By complete chance she mentioned this to scientists at a talk."
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863923.6/warc/CC-MAIN-20180521023747-20180521043747-00086.warc.gz
CC-MAIN-2018-22
354
1
https://dirkstrauss.com/category/how-to/
code
Chrome Developer Tools - As a web developer, one tool that is invaluable is the Chrome Developer Tools. It is a feature rich set of tools that you can use directly from your Chrome Browser. In this article, I will have a look at four Chrome Developer Tools in particular. Sass CSS - If you develop web applications and you have not heard about Sass, then today is your lucky day. To quote a note from the Sass website, it is the most mature, stable and powerful professional grade CSS extension language in the world. If you have ever had The Unbelievably Powerful Multi Select - Being more productive in Visual Studio, ultimately leads to developers getting more done during the day. This is because developers spend most of their working day using Visual Studio. It therefore makes sense to know the hidden productivity tricks that Visual Studio has to Visual Studio 2017 Installer Projects - The one thing that frustrates me a bit (other than iTunes) is how often the Visual Studio installer projects change from version to version. As of this writing there is no project template for Visual Studio 2017. Visual Studio Installer Projects Incompatible I was working on a Windows Task Manager - Resolve High Disk Usage The other day I was debugging an ASP.NET Application, and I noticed that the build and debug was really slow. I then noticed that my laptop fan was spinning continuously, and that this seemed to be related to the debug session. I stopped Parallels Desktop 10 - Do you love your Windows Applications and wish you could run them on your Mac? Well as some of you might or might not know, Parallels Desktop is the perfect solution for you. I write software for a living, so I am what I guess you would Microsoft Azure provides a perfect solution for those with a subscription (BizSpark, MSDN etc.) to test out the previews of various software. I can immediately think of Visual Studio 2015 Preview and Windows 10 Technical Preview. If you don't want to download the ISO's or don't want to set up Setting Different Wallpapers - The other day Scott Hanselman posted a blog post on setting individual wallpapers for each monitor in Windows 8 if you're using multiple monitors. While this isn't strictly something many will find essential, it bugs the heck out of me not being able to do it LinkedIn iOS 8 Widget - So have you installed the iOS 8 widget for LinkedIn? In notification centre, you can now see who has viewed your profile.... or can you? Personally I hope that the app gains more Widget features in future because seeing who viewed my profile is not Resizing VirtualBox Disks - I wanted to resize the hard drive of my VM, and I figured that this would be an easy task. As it turns out, it is extremely easy. The only problem was that it wasn't working. Here is how I resolved that error. Please note, this is my
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823657.20/warc/CC-MAIN-20181211151237-20181211172737-00171.warc.gz
CC-MAIN-2018-51
2,837
14
http://www.imdb.com/title/tt0087065/mediaindex?ref_=ttmd_ql_1
code
Monty Python and the Holy Grail #103 on IMDb Top Rated Movies #150 on STARmeter Find industry contacts & talent representation Manage your photos, credits, & more Showcase yourself on IMDb & Amazon Sign in with Facebook Other Sign in options A young boy and his imaginary friend end up on the run while in possession of a top-secret spy gadget. Find showtimes, watch trailers, browse photos, track your Watchlist and rate your favorite movies and TV shows on your phone or tablet!
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816094.78/warc/CC-MAIN-20180225031153-20180225051153-00205.warc.gz
CC-MAIN-2018-09
480
10
http://forum.cogsci.nl/discussion/5132/custom-fonts-from-the-file-pool
code
Custom Fonts From The File Pool I need to use a custom font for my experiment which I want to place in the File Pool so the experiment is portable and I don't need to ask the IT Department to get involved! However OpenSesame won't use any font I place in the File Pool. I have made sure the font is TTF and have used the syntax from here, namely: draw textline 0.0 0.0 "This will be inconsolata" font_family="inconsolata" But still no joy. The font works fine when I install it and select it from the Font Selection Dialogue, so I know the font itself is fine, so it must be OpenSesame or my code! I have tried the same thing on both Windows and Mac, and have installed the latest version of OS to no avail. The code in question is below, with a screenshot attached showing the File Pool contents. draw textline center=1 color=Black font_bold=no font_family="Open" font_italic=no font_size=50 html=yes show_if=always text="Test using file pool font" x=0 y=-128 z_index=0 Any assistance would be really appreciated, I need to start running my experiment ASAP and this is the last thing in the way! 😥 Thanks all, Rich
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667333.2/warc/CC-MAIN-20191113191653-20191113215653-00391.warc.gz
CC-MAIN-2019-47
1,118
9
https://kb.myetherwallet.com/diving-deeper/
code
Not all articles have been translated! Wanna help? Click here to learn how! More Help, Support, and Communities Links you Should Read Next Does MyEtherWallet.com api limit on the amount of requests I can make? Does MyEtherWallet have an API? Getting Through The Hard Times How to Submit a Pull Request Developing MyEtherWallet v3 MEW Github README
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202924.93/warc/CC-MAIN-20190323181713-20190323203713-00506.warc.gz
CC-MAIN-2019-13
347
10
http://hopesthoughts.blog/2011/09/23/weekly-links-for-922/
code
Weekly links for 9/22. Here are the links for this week. - 33Mail Disposable email addresses for each site you sign up for. - Show Me Non-Stop Type a keyword, and the site will show youtube videos based on it in an endless stream. - switchr.net Switch audio formats, from one to another. I had more links, but decided to save the rest for next week.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583826240.93/warc/CC-MAIN-20190122034213-20190122060213-00128.warc.gz
CC-MAIN-2019-04
349
6
https://community.dynatrace.com/t5/Troubleshooting/How-to-check-Synthetic-Monitor-Websocket-errors-in-logs/tac-p/213302/highlight/true
code
on 26 May 202303:34 AM - edited on 13 Sep 202307:46 AM by HannahM This guide aims to be able to find the WebSocket errors that occur during the execution of a synthetic monitor. In order to see the information mentioned, it would be necessary to download the following files: 1. First, we would need to move to Deployment Status. Figure 1. Deployment Status page. 2. Once we access the page, we will have to select Run ActiveGate diagnostics. Figure 2. Running ActiveGate diagnostics. 3. We will wait until it is completed and then download the files. It is necessary to unzip the files so we can look at them properly. Figure 3. Support Archives Files. 4. We will have to move to the following path: COLLECTOR\0x____\synthetic\vuc-logs. The file we’re looking for it is vuc-browser.log Figure 4. Vuc-broswer.log file. Well done! Now we're ready to analyze the file we have downloaded. To quickly search the logs for synthetic monitors with successful or failed execution, it is possible to filter them using keywords: - TEST_COMPLETED - TEST_ABORTED We’re going to explain both. We will start looking with TEST_ABORTED. Figure 5.Investigating Logs TEST_ABORTED. In this case, we can see in the previous figure that the test was aborted. We can see the message WebSocket connection is closed as the reason. Status 1001. Also, we can see the VisitId highlighted too. We will use the VisitId to search where the problem is in another file. For this example, the VisitId is 6680333610458108891. In order to look at what we mentioned, it would be necessary to move to the path: \COLLECTOR\0X______\synthetic\vup-logs Now, we're going to look for the same visitor ID in this folder: Figure 6. Vup-logs folder. ⚠️Important:Only recently executed tests can be viewed in the image above. Later on, we will see how it is possible to check older executions. The number of the VisitId is in the middle of the file names. For example, in our case, we could find the VisitId of our Synthetic Monitor Test just because it was a recent one. Figure 7. Looking for the VisitId. As soon as the file corresponding to the VisitId has been found, we will examine it. Some keywords are possible to use to look for in the mentioned file: - Index - Step - Type Using these words, you can find in what step the test got stuck, as we can see in the following figure: Figure 8. Looking for the last steps. In the example above, it is shown that the test got stuck between steps 42 and 43. To try to fix it, we will have to work on the configurations of these steps. Now, we’re going to look for TEST_COMPLETE. Figure 9. Investigating Logs TEST_COMPLETE. In this case, we can see in the last picture that the test was completed. We can see the message WebSocket connection is closed. Status 1000. Also, we can see the VisitId highlighted too. In this case, the Status is 1000, which means satisfactory. We will use the VisitId to search where the problem is in another file. For this example, the VisitId is 1087214098859927268. It would be necessary to move to the path we saw before: \COLLECTOR\0X______\synthetic\vup-logs Now, we’re going to look for the same VisitID in this folder: Figure 10. Looking for the VisitId. We can look for the exact keywords we saw before to check all the steps the test did in this case. If you’re interested in checking some tests and it is not in the recent tests folder (there only appeared 1 hour ago tests), please check the next steps. First of all, if we’re checking the file vuc-browser.log (Figure 5) and we select a VisitId to check in the recent tests folder, but it does not appear there, it is needed to go to: \COLLECTOR\0x___\synthetic\vup-archivedLogs. In this folder, we will see other folders named Dates and Hours: Figure 11. vup-archivedLogs folder. To look for our Test, it would be necessary to remember the exact date and hour of the date. For example: Figure 12. Investigating Logs TEST_ABORTED. If we go to the vups-logs folder as we did before in Figure 10 or 7, we’re not going to be able to find the test from Figure 12. Therefore, it is necessary to check when the test was executed. As we can see in the following picture, it was executed around 18:00. Figure 13. Date and hour of a test. So, if we move to vup-archivedLogs folder (Figure 11), we will have to look for day 29 and hour 18. Figure 14. Folder with the exact day and hour. Inside, we would have to be able to find the synthetic we were investigating in Figure 12. Figure 15. Vup-archivedLogs folder. Once we have found it, we will have to check the steps or how the test was.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00715.warc.gz
CC-MAIN-2023-40
4,592
49
https://github.com/thomasmesnard/CTC-LSTM
code
This repositry contains an implementation of the CTC cost function (Graves et al., 2006). CTC cost is implemented in pure Theano. To avoid numerical underflow, two solutions are implemented: - Normalization of the alphas at each timestep - Calculations in the logarithmic domain This repository also contains sample code for applying CTC to two datasets, a simple dummy dataset constituted of artificial data, and code to use the TIMIT dataset. The models are implemented using Blocks. Both datasets are implemented using Fuel. The model on the TIMIT dataset is able to learn up to 50% phoneme accuracy using no handcrafted processing of the signal, but instead uses an end-to-end model composed of convolutions, LSTMs, and the CTC cost function. Graves, Alex, et al. Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks. Proceedings of the 23rd international conference on Machine learning. ACM, 2006.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00471.warc.gz
CC-MAIN-2022-40
955
8
https://www.artcrystal.cz/en/lustr-s-ovesy-strass-l251ce-silver.html
code
DO YOU NEED HELP Chandelier with strass trimmings L251CE, SilverArt.No.: L251CENi Modern crystal ceiling light is richly decorated with long chains made of best quality Bohemian crystal. Chandelier with interesting shape fits to modern interiors, which can be beautifully lighten and brighten by its shimmering brilliance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864354.27/warc/CC-MAIN-20180622045658-20180622065658-00310.warc.gz
CC-MAIN-2018-26
322
3
http://www.ivillage.com/forums/print/107302482
code
Too much fruitcake = kicked out of OLD?? According to this article in the Guardian , an online dating website is kicking out members who overindulged during the recent holiday season. What do you think about this - is it sizeism at its finest? Would you become or remain a member of a site that excluded candidates based on their size?
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776405824.29/warc/CC-MAIN-20140707234005-00091-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
335
3
https://communityforums.rogers.com/t5/TV/Delete-recording-quot-not-at-this-time-quot/td-p/379289
code
With the recent navigator update, when trying to delete a recording after watching, the response is"not at this time". You need to wait a while and try again. Why wasn't this tested before releasing the update? Anyone have a workaround? Yeah, I've noticed recently (in the last week or so) that (occasionally) when I go to delete a programme it will not allow me to delete it. I usually just try again a few seconds later and it works. This may be similar to the "not enough resources" issue that used to happen a while back for some people. My guess is that the PVR is "busy" doing other things when you're trying to delete that programme. Just another Navigatr quirk and poor coding that has been discussed extensively in the various Navigatr threads. My 9865 has not rebooted since November 11, so I'll try a reboot to see if that solves the problem.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145966.48/warc/CC-MAIN-20200224163216-20200224193216-00163.warc.gz
CC-MAIN-2020-10
853
4
https://www.equiwatt.com/help/how-do-i-report-a-bug-with-the-app
code
You can report a bug by contacting us via the community forum or via email. If you want to report a bug to the team, the easiest way to do it is via the community forum. To gain access, simply log in with your equiwatt app credentials. You will then be able to see if the bug you have found has already been reported or report it yourself via the appropriate category of the forum. If you are not a member of the community forum you can report a bug by sending us an email at [email protected].
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00466.warc.gz
CC-MAIN-2023-50
507
4